WO2015160157A1 - Method for proximity-based notification in wireless communication system, and device for same - Google Patents

Method for proximity-based notification in wireless communication system, and device for same Download PDF

Info

Publication number
WO2015160157A1
WO2015160157A1 PCT/KR2015/003674 KR2015003674W WO2015160157A1 WO 2015160157 A1 WO2015160157 A1 WO 2015160157A1 KR 2015003674 W KR2015003674 W KR 2015003674W WO 2015160157 A1 WO2015160157 A1 WO 2015160157A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
d2d
ue
service
id
Prior art date
Application number
PCT/KR2015/003674
Other languages
French (fr)
Korean (ko)
Inventor
김학성
신승문
정성훈
노유진
Original Assignee
엘지전자(주)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US61/978,979 priority Critical
Priority to US201461978978P priority
Priority to US201461978977P priority
Priority to US201461978979P priority
Priority to US201461978976P priority
Priority to US61/978,977 priority
Priority to US61/978,976 priority
Priority to US61/978,978 priority
Application filed by 엘지전자(주) filed Critical 엘지전자(주)
Publication of WO2015160157A1 publication Critical patent/WO2015160157A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/0009Transmission of position information to remote stations
    • G01S5/0018Transmission from mobile station to base station
    • G01S5/0036Transmission from mobile station to base station of measured values, i.e. measurement on mobile and position calculation on base station
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0284Relative positioning
    • G01S5/0289Relative positioning of multiple transceivers, e.g. in ad hoc networks
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/18Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using ultrasonic, sonic, or infrasonic waves
    • G01S5/26Position of receiver fixed by co-ordinating a plurality of position lines defined by path-difference measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/024Guidance services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • H04W4/08User group management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Abstract

A method for proximity-based notification in a wireless communication system and a device for same are disclosed. In particular, the method for proximity-based notification in a wireless communication system, which supports device-to-device (D2D) communication, may comprise: a step in which a first terminal sets up a list of terminals participating in a notification service and a notification time; a step in which the first terminal broadcasts a first discovery signal including a first D2D ID via a physical sidelink discovery channel (PSDCH) upon reaching the notification time; and a step for outputting a notification for notifying the proximity of a second terminal if the first terminal receives a second discovery signal including a second D2D ID via the PSDCH from the second terminal belonging to the list of terminals.

Description

 【Specification】

 [Name of invention]

 Proximity-based notification method in wireless communication system and apparatus therefor

 Technical Field

 The present invention relates to a wireless communication system, and more particularly, to a proximity-based notification method and an apparatus for supporting the same in a wireless communication system supporting device to device communication (D2D).

 Background Art

 Mobile communication systems have been developed to provide voice services while ensuring user activity. However, the mobile communication system has expanded not only voice but also data services. Currently, the explosive increase in traffic causes a shortage of resources and the demand for faster services. It is becoming.

The requirements of the next generation mobile system can support the massive explosive data traffic, the dramatic increase in transmission rate per user, the large increase in the number of connected devices, the very low end-to-end latency, and the high energy efficiency. It should be possible. For this purpose, dual connectivity, Massive Multiple Input Multiple Output (MIMO), In-band Full Duplex, Non-Orthogonal Multiple Access (NOMA), Super Wideband (Super) Wideband Support, Terminal Networking (Device) Various technologies such as networking have been studied.

 [Content of invention]

 [Technical problem]

 An object of the present invention is to propose a proximity-based notification method for notifying that each terminal is close to a schedule location among a plurality of terminals having the same schedule.

 In addition, an object of the present invention proposes a proximity-based notification method for notifying that a store providing a service associated with information input by a terminal user is close. In addition, an object of the present invention is to propose a method for preventing duplication of service IDs assigned for each service in a situation where a plurality of services are provided.

 In addition, an object of the present invention is to propose a D2D terminal group management method for managing the position of a group member terminal around a specific D2D terminal in a D2D group consisting of a plurality of D2D terminals.

 Another object of the present invention is to propose a D2D terminal group management method for maintaining a connection (connection) between a terminal deviating from a coverage and a group member terminal when the D2D group member terminal leaves a predetermined coverage.

Technical problems to be achieved in the present invention are not limited to the above-mentioned technical problems, and other technical problems not mentioned above will be clearly understood by those skilled in the art from the following description. Could be. Technical solution

 According to an aspect of the present invention, in a proximity-based notification method in a wireless communication system supporting device to device communication (D2D), a terminal list and notification time at which a first terminal participates in a notification service are provided. The method of claim 1, wherein when the notification time is reached, the first terminal broadcasts a first discovery signal including a first D2D ID through a physical sidelink discovery channel (PSCH) and the first terminal. And when a second discovery signal including a second D2D ID is received through a PSDCH from a second terminal belonging to the terminal list, outputting a notification for notifying that the second terminal is in proximity. Can be.

According to another aspect of the present invention, there is provided an RF for transmitting and receiving a radio signal in a first terminal for performing proximity based notification in a system that supports device to device communication (D2D). (Radio Frequency) unit and a processor, wherein the processor sets a terminal list and a notification time to participate in the notification service, and when the predetermined notification time is reached, the first discovery including a first D2D ID (discovery) ) Signal is broadcasted through a physical sidelink discovery channel (PSCH), and when a second discovery signal including a second D2D ID is received from the second terminal included in the terminal list through the PSDCH, the second terminal is received. It may be configured to output a notification for notifying this proximity. Preferably, the first terminal may further include transmitting a notification service use consent request message for requesting participation in the notification service to the second terminal.

 Preferably, the first terminal may further include receiving the first D2D ID and the second D2D ID from a D2D ID management server.

 Preferably, the first terminal may further include receiving the first D2D ID from a D2D ID management server and the first terminal receiving the second D2D ID from the second terminal.

 Preferably, the first terminal may further include the step of returning the first D2D ID to the D2D ID management server.

 According to another aspect of the present invention, in a proximity-based notification method in a wireless communication system supporting device to device communication (D2D), the terminal receiving input information from a user, the terminal Mapping the input information to a service ID, and monitoring whether the mapped service ID is included in a discovery signal transmitted from a neighboring terminal through a physical side link discovery channel (PSCH) from a neighboring terminal; Ringing and when the terminal receives a discovery signal including the mapped service ID, outputting a notification for notifying that the service matched with the mapped service ID is close.

Another aspect of the invention, the terminal-to-device communication (D2D: Device to Device A terminal for performing proximity-based notification in a wireless communication system supporting communication, the terminal comprising: an input unit for inputting information, a radio frequency (RF) unit for transmitting and receiving a radio signal, and a processor; a receives the input information from the user, maps the input information and services lD (Ser V i Ce ID), and the mapping to the discovery (discovery) signal transmitted over a PSDCH (Physical Side link Discovery Channel) from a peripheral terminal Monitoring whether a service ID is included and outputting a notification for notifying that a service corresponding to the mapped service ID is close when receiving a discovery signal including the mapped service ID.

 The method may further include generating, by the terminal, a discovery signal monitoring list including link information for connecting to the mapped service ID and the application program to which the input information is input.

 The terminal may further include displaying, by the terminal, a grand program in which the input information is input using the link information.

 Preferably, the service ID may be hierarchically configured through a combination of one or more sub-service IDs.

 Advantageous Effects

According to an embodiment of the present invention, it is possible to confirm in real time that each terminal is close to a schedule location among a plurality of terminals having the same schedule, such as a meeting or an appointment. Further, according to an embodiment of the present invention, association with information input by the terminal user It can be confirmed in real time that the shops that provide the service are close. In addition, according to an embodiment of the present invention, duplication of service ID can be prevented even in a situation where a plurality of services are provided.

 In addition, according to an embodiment of the present invention, the position of the D2D group member terminal can be continuously managed based on the D2D signal.

 In addition, according to an embodiment of the present invention, even when the D2D group member terminal deviates from the predetermined coverage, the connection between the terminal deviating from the coverage and the group member terminal can be maintained.

 Effects obtained in the present invention are not limited to the above-mentioned effects, and other effects not mentioned above may be clearly understood by those skilled in the art from the following description. will be.

 [Brief Description of Drawings]

 BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, included as part of the detailed description in order to provide a thorough understanding of the present invention, provide examples of the present invention and together with the description, describe the technical features of the present invention.

 Figure 1 illustrates an M2M system according to the ETSI technical standard to which the present invention can be applied.

2 shows an example of a network structure of an evolved universal terrestrial radio access network (E-UTRA) to which the present invention can be applied. Figure 3 is a terminal and E-UTRA in a wireless communication system to which the present invention can be applied Its radio interface protocol structure is shown. 4 shows a structure of a radio frame in a wireless communication system to which the present invention can be applied.

 FIG. 5 is a diagram illustrating a resource grid for one downlink slot in a wireless communication system to which the present invention can be applied.

 6 shows a downlink subframe structure in a wireless communication system to which the present invention can be applied.

 7 shows a structure of an uplink subframe in a wireless communication system to which the present invention can be applied.

 8 is a flowchart illustrating a process of establishing an RRC connection in a wireless communication system to which the present invention can be applied.

 9 is a flowchart illustrating a RRC connection resetting process in a wireless communication system to which the present invention can be applied.

 10 is a diagram illustrating an uplink resource allocation process of a terminal in a wireless communication system to which the present invention can be applied.

 11 is a diagram for conceptually explaining D2D communication in a wireless communication system to which the present invention can be applied.

 12 illustrates an example of various scenarios of D2D communication to which the method proposed in the specification may be applied.

13 is a distributed discovery in a wireless communication system to which the present invention can be applied. A diagram for explaining a resource allocation method.

 FIG. 14 is a diagram briefly illustrating a discovery process of a terminal using a distributed discovery resource allocation method in a wireless communication system to which the present invention can be applied.

 FIG. 15 is a diagram for explaining a method of transmitting / receiving signaling for D2D direct communication in a wireless communication system to which the present invention can be applied.

 16 is a view for explaining a method for transmitting downlink control information for D2D direct communication in a wireless communication system to which the present invention can be applied.

 17 is a diagram illustrating a scenario of measuring a location of a UE using a D2D signal / channel according to an embodiment of the present invention.

 18 illustrates a spread delay between UEs according to an embodiment of the present invention.

 19 and 20 are diagrams for describing a method of measuring a distance between an operating UE and a target UE using a D2D signal / channel according to an embodiment of the present invention.

 21 to 24 are diagrams for describing a method of measuring a location of a target UE using a D2D signal / channel according to an embodiment of the present invention.

 25 and 26 are diagrams for describing a method of measuring a location of a target UE or a distance from the target UE using a D2D signal / channel according to an embodiment of the present invention. 27 illustrates a user interface for implementing a method for managing a D2D terminal group according to an embodiment of the present invention.

28 to 34 illustrate a method for managing a D2D terminal group according to an embodiment of the present invention. It is a figure which illustrates.

 35 is a diagram illustrating a user interface (UI) for implementing a proximity-based notification method according to an embodiment of the present invention.

 36 to 38 are diagrams illustrating a proximity-based notification method according to an embodiment of the present invention.

 FIG. 39 is a diagram for describing a method of matching a specific information field and a D2D ID according to an embodiment of the present invention. FIG.

 40 to 42 are diagrams illustrating a user interface for implementing a proximity-based notification method according to an embodiment of the present invention.

 43 illustrates a user interface for receiving information from a user according to an embodiment of the present invention.

 44 is a diagram illustrating a user interface for receiving information from a user using a link function according to an embodiment of the present invention.

 45 is a diagram illustrating an association service table according to an embodiment of the present invention.

 46 is a diagram illustrating a D2D discovery signal monitoring list according to an embodiment of the present invention.

 47 is a diagram illustrating a branch of a hierarchical service ID according to an embodiment of the present invention.

48 is a view illustrating a mapping result of an association word and a service ID according to an embodiment of the present invention; It is an illustration to illustrate.

 49 is a diagram illustrating a format of a discovery signal according to an embodiment of the present invention.

 50 is a diagram illustrating a setting menu screen for implementing a proximity-based notification method according to an embodiment of the present invention.

 51 is a diagram illustrating a proximity-based notification method according to an embodiment of the present invention.

 52 to 54 illustrate a method for preventing duplication of a service ID according to an embodiment of the present invention.

 55 is a block diagram illustrating a wireless communication device according to one embodiment of the present invention.

 [Form for implementation of invention]

 Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. The detailed description, which will be given below with reference to the accompanying drawings, is intended to explain exemplary embodiments of the present invention and is not intended to represent the only embodiments in which the present invention may be practiced. The following detailed description includes specific details in order to provide a thorough understanding of the present invention. However, one of ordinary skill in the art appreciates that these three persons may be practiced without these specific details.

In some cases, well-known structures and devices are omitted to avoid obscuring the concepts of the present invention, or they may be in the form of a blotting degree around the core functions of each structure and device. It may be shown as.

 In this specification, a base station has a meaning as a terminal node of a network that directly communicates with a terminal. Certain operations described as being performed by the base station in this document may be performed by an upper node of the base station in some cases. That is, it is apparent that various operations performed for communication with the terminal in a network including a plurality of network nodes including a base station may be performed by the base station or other network nodes other than the base station. A base station (BS) may be replaced by terms such as a fixed station, a Node B, an evolved-NodeB (eNB), a base transceiver system (BTS), and an access point (AP). . In addition, a 'terminal' may be fixed or mobile, and may include a user equipment (UE), a mobile station (MS), a user terminal (UT), a mobile subscriber station (MSS), a subscriber station (SS), and an AMS ( Advanced Mobile Station (WT), Wireless Terminal (WT), Machine-Type Communication (MTC) Device, Machine-to-Machine (M2M) Device, Device-to-Device (D2D) Device, etc.

Hereinafter, downlink (DL) means communication from a base station to a terminal, and uplink (UL) means communication from a terminal to a base station. In downlink, a transmitter may be part of a base station, and a receiver may be part of a terminal. In uplink, a transmitter may be part of a terminal and a receiver may be part of a base station. Specific terms used in the following description are provided to help the understanding of the present invention, and the use of the specific terms may be changed into other forms without departing from the technical spirit of the present invention.

 The following techniques are code division multiple access (CDMA), frequency division multiple access (FDMA), time division multiple access (TDMA), orthogonal frequency division multiple access (OFDMA), single carrier frequency division multiple access (SC-FDMA), and NOMA It may be used in various radio access systems such as non-orthogonal multiple access (CDMA). CDMA may be implemented by radio technology such as universal terrestrial radio access (UTRA) or CDMA2000. TDMA may be implemented with a wireless technology such as global system for mobile communications (GSM) / general packet radio service (GPRS) / enhanced data rates for GSM evolution (EDGE) ≦ f. OFDMA may be implemented with a radio technology such as IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), IEEE 802-20, evolved UTRA (E-UTRA), or the like. UTRA is part of a universal mobile telecommunications system (UMTS). 3rd generation partnership project (3GPP) long term evolution (LTE) is part of evolved UMTS (E-UMTS) using E-UTRA, and employs OFDMA in downlink and SC-FDMA in uplink. LTE-A (advanced) is the evolution of 3GPP LTE.

Embodiments of the present invention provide wireless access systems such as the European Telecommunications Standards Institute (ETSI), IEEE 802, 3GPP and 3GPP2. It may be supported by the standard documents disclosed in at least one of. That is, steps or parts which are not described in order to clearly reveal the technical spirit of the present invention among the embodiments of the present invention may be supported by the above documents. In addition, all terms disclosed in the present document can be described by the above standard document.

 . Concepts and technologies for sharing information by connecting a thing to a network using a communication device attached to a thing or configuring a communication network between things may be referred to as IoT communication.

 ETS 工 refers to M2M as a machine-to-machine, and defines M2M as communication that occurs between two or more objects that do not require human intervention.

 In this specification, an M2M server refers to a server for M2M communication and refers to a fixed station or a mobile station. The M2M server may communicate with M2M devices and / or other M2M servers to exchange data and control information. In addition, in the present invention, the M2M gateway refers to a device that performs the role of connecting points from one network to another when the network to which the M2M device is connected and the network to which the M2M server is connected are different.

In addition, the term “entity” may be used herein to refer to hardware such as an M2M device, an M2M gateway, an M2M server, or may refer to the M2M application layer and the M2M (common) service layer described below. It may be used to refer to a software component. Figure 1 illustrates an M2M system according to the ETSI technical standard to which the present invention can be applied.

 The M2M system according to the ETSI TS M2M technical standard defines a common M2M service framework for various M2M applications. An M2M application can refer to a software component that implements M2M service solutions such as e-Health, City Automation, Connected Consumer, and Automotive. have. In the M2M system, functions necessary to implement such various M2M applications are provided in common, and the functions commonly required may be referred to as M2M service or M2M common service. By using these M2M common services, M2M applications can be easily implemented without having to reconfigure the basic service framework for each M2M application.

 The M2M service is provided in the form of Service Capability (SC), and the M2M application can access the SC through an open interface and use the M2M service provided by the SC. An SC is a set of functions of an M2M service that can be used when an M2M application is provided on a service framework. SC may collectively refer to SC entity (Service Capability Entity) and SC layer (Service Capability Layer).

SC may be expressed as XSC. Here, X may be represented as one of N / G / D, and the SC may be a network (and / or server), a gateway, a device. It indicates where the device is. For example, NSC represents an SC present on the network and / or server, and GSC represents an SC present on the gateway.

 The M2M application may be on a network, gateway, or device.

 An M2M application present on a network or directly connected to a server may be referred to as an M2M network application and may be simply referred to as a network application (NA). For example, NA is software implemented by connecting directly to a server, and may communicate with and manage an M2M gateway or an M2M device.

 The M2M application existing on the device is referred to as an M2M device application and may simply be referred to as DA (Device Application S). For example, DA is software running on the M2M device, and may transmit sensor information and the like to the NA.

 The M2M application existing on the gateway is referred to as an M2M gateway application and may be briefly referred to as a gateway application (GA). For example, the GA may also be responsible for managing the M2M gateway and may provide SC with Service Capability (SC). An M2M application may collectively refer to an application entity (AE) and an application layer.

Referring to FIG. 1, a high level architecture for M2M architecture) may be divided into a network domain and a device and gateway domain.

 The Network Domain includes access network core networks, Μ2Μ service capabilities (SC), Μ2Μ applications, network management functions, and M2M management functions. It can be composed of).

 An access network is an entity that allows M2M devices and gateway domains to communicate with the core network. Examples of access networks include xDSL (Digital Subscriber Line), Hybrid Fiber Coax (HFC), satellite, GERAN, UTRAN, eUTRAN, Wireless LAN, WiMAX, and the like.

 A core network is an entity that provides functions such as Internet Protocol (IP) connectivity, services and network control, interconnection, and roaming. Core networks include 3GPP (3rd Generation Partnership Project) core networks, ETSI TISPAN (Telecommunications and Internet converged Services and Protocols for Advanced Networking) core networks, and 3GPP2 core networks.

Thus, in the example of FIG. 1, the core network and access network provide connectivity between each entity rather than perform M2M functions. Through the core network and access network, between network domains and device and gateway domains M2M communication may be performed, and the M2M application of each domain may exchange signals or information through the SC of each domain.

 The M2M SC provides an M2M Common Service Function (CSF) that can be shared by multiple M2M network applications and exposes M2M services through an open interface so that M2M applications can use M2M services. do. An M2M SC entity can be understood as an instance of a common service function (CSF) and provides a subset of common service functions (CSFs) that can be used and shared by M2M applications. The M2M Service Capability Layer (SCL) may refer to a layer including such an M2M SC entity.

 An M2M application is an entity that runs service logic and can use the M2M SC through an open interface. The M2M application layer may refer to a layer including such M2M application and related operational logic.

 The network management function consists of functions required for managing the core network and the access network. These features include provisioning, supervision, and fault management.

The M2M management function consists of the functions required to manage the M2M SC in the network domain. A specific M2M SC is used to manage M2M devices and gateways. A set of M2M management features is available for M2M service bootstrap. Includes features. This feature is called MSBF (M2M Service Bootstrap Function) and is implemented on the appropriate server. The role of the MSBF enables bootstrapping of persistent M2M service layer security credentials on M2M devices (or M2M gateways) and on M2M SCs within the network domain. Permanent security credentials that are bootstrap using an MSBF (eg, M2M root key) are stored in a secure location called the M2M Authentication Server (MAS). This server may be an AAA server. The MSBF may be included in the MAS and may also communicate with the MAS through the appropriate interface (eg Diameter if the MAS is AAA). The corresponding permanent security certificate established in the D / G M2M node during the bootstrap is stored in the Secured Environment Domain of the D / G M2M node.

 The device and gateway domain consists of an M2 device, an M2M area network, and an M2M gateway.

 The M2M device is an entity that runs the M2M device application through the M2M SC. The M2M device may include an M2M application and / or an M2M SC.

The M2M device may be connected with the network domain (ie, communicate with an M2M server in the network domain) via an access network. The M2M device performs procedures such as registration, authentication, authorization, management, and provisioning with the network domain. M2M Sheet The device may be connected with other devices (eg, legacy devices, etc.) hidden from the network domain to provide a service.

 In addition, the M2M device may be connected to the network domain (that is, communicate with the M2M server of the network domain) through the M2M gateway. When connected through an M2M gateway, the M2M gateway acts like a proxy. An example of the ethoxy procedure of the M2M gateway includes authentication, authorization, management, and provisioning. The M2M device is connected using an M2M gateway and an M2M area network.

 The M2M device may connect multiple M2M gateways to the nucleus network domain.

 The M2M area network provides connectivity between the M2M device and the M2M gateway. In this case, the network between the M2M gateway and the M2M server and the network between the M2M device and the M2M gateway may be different from each other. For example, M2M area networks include PAN (Personal Area Network) technologies such as IEEE802.15.1, Zigbee, Bluetooth, IETF ROLL, ISAlOO.lla, and Power Line Communication (PLC), M-BUS, and Wireless. It can be implemented using local network technologies such as M-BUS, KX, and the like.

The M2M Gateway is an entity that manages M2M applications and provides services for M2M applications through the M2M SC. The M2M gateway may include an M2M application and / or an M2M SC. M2M Gateway is a gate of M2M devices It may refer to an entity having a way function.

 The 2M gateway may serve as a proxy between the M2M device and the network domain, and provide a service by being connected to another device (eg, a legacy device) hidden from the network domain. For example, an M2M gateway can run an application that collects and handles a variety of information (eg, information from sensors and contextual parameters).

 The M2M system architecture illustrated in FIG. 1 is merely an example and the names of each entity may be different. For example, in a system according to the oneM2M technical specification (referred to as oneM2M system), 2 SCs may be referred to as an M2M common service entity (CSE), and a Service Capability Layer (SCL) may be referred to as a common service layer (CSL). : Common Service Layer). In addition, an M2M application may be referred to as an application entity (AE), and the M2M application layer may be referred to simply as an application layer. Likewise, the name of each domain may also vary. For example, in a oneM2M system, a network domain may be referred to as an infrastructure domain, and a device and gateway domain may be referred to as a field domain.

 As illustrated in FIG. 1, an M2M system may be understood as a hierarchical structure including an M2M application layer and an M2M SC layer for M2M communication.

Meanwhile, even in 3GPP, MTC (Machine Type) regarding IoT communication Standardization is underway under the name Communications. 3GPP defines MTC as a form of data communication involving one or more objects that do not require human intervention.

 In the present specification, MTC may be understood to have the same meaning as ^ "water intelligence communication, Internet of Things (IoT), M2M, and Device-to-Device (D2D).

 Hereinafter, in order to clarify the description of the present invention, the description will be mainly on the 3GPP LTE / LTE-A, but the technical features of the present invention is not limited thereto. General system to which the present invention can be applied

 2 shows an example of a network structure of an evolved universal terrestrial radio access network (E-UTRAN) to which the present invention can be applied.

The E-UTRAN system is an evolution from the existing UTRA system, and may be, for example, a 3GPP LTE / LTE-A system. The E-UTRAN consists of base stations (eNBs) that provide a control plane and a user plane protocol to the terminal, and the base stations are connected through an X2 interface. An X2 user plane interface (X2-U) is defined between base stations. The X2-U interface provides non-guaranteed delivery of user plane packet data units (PDUs). An X2 control plane interface (X2-CP) is defined between two neighboring base stations. X2-CP transfers context between base stations, control of user plane tunnel between source base station and target base station, handover related message transfer, uplink part To perform functions such as management. The base station is connected to the terminal through a wireless interface and is connected to the evolved packet core (EPC) through the S1 interface. Using S1 I "plane interface (SI-U) is defined between a base station and a serving gateway (S-GW). The S1 control plane interface (S1-MME) is a base station and mobility management entity.

(ME: mobility management entity) ^ "I is defined as 1. The S1 interface performs evolved packet system (EPS) bearer service management functions, non-access stratum (NAS) signaling transport functions, network sharing, MME load balancing functions, and the like. The S1 interface is the many-to-many relationship between the base station and the MME / S-GW.

(many-to-many-relation) ¾ Supported.

 3 shows a structure of a radio interface protocol between a terminal and an E-UTRAN in a wireless communication system to which the present invention can be applied. FIG. 3 (a) shows a radio protocol structure for a control plane and FIG. 3 (b) shows a radio protocol structure for a user plane. Referring to Figure 3, the layers of the air interface protocol between the terminal and the E-UTRAN are well known open system interconnects known in the art of communication systems.

(OSI: open system interconnection) can be divided into a first layer (L1), a second layer (L2) and a third layer (L3) based on the lower three layers of the model. The air interface protocol between the UE and the E-UTRAN consists of a physical layer, a data link layer, and a network layer horizontally, and vertically transmits data information. Protocol stack In the protocol stack, it is divided into "user plane" and "control plane", which is a protocol stack for transmitting control signals.

 The control plane refers to a path through which control messages used by the terminal and the network to manage a call are transmitted. The user plane refers to a path through which data generated at an application layer, for example, voice data or Internet packet data, is transmitted. Hereinafter, each layer of the control plane and the user plane of the radio protocol will be described.

The physical layer (PHY), which is the first layer (L1), provides an information transfer service to an upper layer by using a physical channel. The physical layer is connected via a transport channel to a medium access control (MAC) layer located at a level above 1 " , and data is transmitted between the MAC layer and the physical negotiation through the transport channel. Channels are classified according to how and with what characteristics data is transmitted through an air interface, and data is transmitted through physical channels between different physical layers, between a physical layer of a transmitter and a physical layer of a receiver. The physical layer is modulated by orthogonal frequency division multiplexing (OFDM) and uses time and frequency as radio resources.

There are several physical control channels used at the physical layer. A physical downlink control channel (PDCCH) is a paging channel (PCH) and a downlink shared channel (DL—SCH) downlink shared to the UE. It informs HARQ (hybrid automatic repeat request) information related to resource allocation of a channel (UL) and an uplink shared channel (UL-SCH). In addition, the PDCCH may carry an UL grant that informs the UE of resource allocation of uplink transmission. The physical control format indicator channel (PDFICH: physical control format indicator channel) informs the UE of the number of OFDM symbols used in the PDCCHs and is transmitted every subframe. The physical HARQ indicator channel (PHICH) carries a HARQ ACK (non acknowledge) / NACK (non-acknowledge) signal in response to uplink transmission. Physical uplink control channel. A physical uplink control channel (PUCCH) carries uplink control information such as HARQ ACK / NACK for a downlink transmission, a scheduling request, and a channel quality indicator (CQI). A physical uplink shared channel (PUSCH) carries a UL—SCH.

 The MAC layer of the second layer (L2) provides a service to a radio link control (RLC) layer, which is a higher layer, through a logical channel. In addition, the MAC layer multiplexes / demultiplexes into a transport block provided as a physical channel on a transport channel of a MAC service data unit (SDU) belonging to the logical channel and mapping between the logical channel and the transport channel. Includes features.

The RLC layer of the second layer (L2) supports reliable data transmission. RLC system Layer functions include concatenation, segmentation and reassembly of RLC SDUs. In order to guarantee the various quality of service (QoS) required by the radio bearer (RB), the RLC layer uses transparent mode (TM), unacknowledged mode (UM) and acknowledgment mode (AM). There are three modes of operation: acknowledge mode. AM RLC provides error correction through an automatic repeat request (ARQ). Meanwhile, when the MAC layer performs the RLC function, the RLC layer may be included as a functional block of the MAC layer.

 The packet data convergence protocol (PDCP) layer of the second layer (L2) performs a function of delivering user data, header compression, and ciphering in the user plane. Header compression is relatively large in order to allow efficient transmission of Internet protocol (IP) packets, such as IPv4 (internet protocol version 4) or IPv6 (internet protocol version 6), over a small bandwidth wireless interface. It means the function to reduce the IP packet header size which contains large and unnecessary control information. The function of the PDCP layer in the control plane includes the transfer of control plane data and encryption / integrity protection.

A radio resource control (RRC) layer located at the lowest part of the third layer (L3) is defined only in the control plane. The RRC layer plays a role of controlling radio resources between the terminal and the network. For this purpose, the terminal and the network are RRC Exchange RRC messages with each other through the layer. The RRC layer controls the logical channel, transport channel and physical channel with respect to configuration, re-configuration and release of radio bearers. The radio bearer means a logical path provided by the second layer (L2) for data transmission between the terminal and the network. The establishment of a radio bearer means defining characteristics of a radio protocol layer and a channel to provide a specific service, and setting each specific parameter and operation method. The radio bearer may be divided into signaling radio bearer (SRB) and data radio bearer (DRB). The SRB is used as a path for transmitting RRC messages in the control plane, and the DRB is used as a path for transmitting user data in the user plane.

 A non-access stratum (NAS) layer located above the RRC layer performs functions such as session management and mobility management.

 One cell constituting the base station is set to one of the bandwidth, such as 1.25, 2.5, 5, 10, 20Mhz to provide a downlink or uplink transmission service to multiple terminals. Different cells may be configured to provide different bandwidths.

A downlink transport channel for transmitting data from a network to a terminal is a broadcast channel (BCH) for transmitting system information, a PCH for transmitting a paging message, and a DL-SCH for transmitting user traffic or control messages. There is this. Traffic or control of downlink multicast or broadcast service The message may be transmitted through the DL-SCH or may be transmitted through a separate downlink multicast channel (MCH). Meanwhile, a UL access channel (RACH) that transmits an initial control message, an UL-SCH that transmits user traffic or a control 1 message as an uplink transport channel for transmitting data from the terminal to the network. (uplink shared channel) 7]-Yes.

 The logical channel is on top of the transport channel and is mapped to the transport channel. The logical channel may be divided into a control channel for transmitting control region information and a traffic channel for delivering user region information. Logical channels include broadcast control channel (BCCH), paging control channel (PCCH), common control channel (CCCH), dedicated control channel (DCCH), multicast There are a multicast control channel (MCCH), a dedicated traffic channel (DTCH), a multicast traffic channel (MTCH), and the like.

 4 shows a structure of a radio frame in a wireless communication system to which the present invention can be applied.

3GPP LTE / LTE—A supports one type 1 radio frame structure applying FDD (Frequency Division Duplex) 1 and one type 2 radio frame structure applicable to TDD (Time Division Duplex). 4A illustrates a structure of a type 1 radio frame. A radio frame includes 10 subframes. One subframe consists of two slots in the time domain. The time taken to transmit one subframe is called a transmission time interval (TTI). For example, one subframe may have a length of lms and one slot may have a length of 0.5ms.

 One slot includes a plurality of orthogonal frequency division multiplexing (OFDM) symbols in the time domain and a plurality of resource blocks (RBs) in the frequency domain. Since 3GPP LTE uses OFDMA in downlink, an OFDM symbol is for representing one symbol period. The OFDM symbol may be referred to as one SC-FDMA symbol or symbol period. A resource block is a resource allocation unit and includes a plurality of consecutive subcarriers in one slot.

4 (b) shows a type 2 frame structure (frame structure type 2), wherein a type 2 radio frame includes two half frames, and each half frame includes five subframes and a downlink pilot (DwPTS). It consists of Time Slot, Guard Period (GP), and Uplink Pilot Time Slot (UpPTS), and one subframe consists of two slots. The DwPTS is used for initial cell discovery, synchronization, or channel estimation at the terminal. UpPTS is used for channel estimation at the base station and synchronization of uplink transmission of the terminal. The guard interval is between uplink and downlink This is a section for removing interference caused in the uplink due to the multipath delay of the downlink signal.

 The structure of the radio frame is only one example, and the number of subcarriers included in the radio frame or the number of slots included in the subframe and the number of OFDM symbols included in the slot may be variously changed.

 FIG. 5 is a diagram illustrating a resource grid for one downlink slot in a wireless communication system to which the present invention can be applied.

 Referring to FIG. 5, one downlink slot includes a plurality of OFDM symbols in the time domain. Here, one downlink slot includes seven OFDM symbols and one resource block includes 12 subcarriers in the frequency domain, but is not limited thereto.

 Each element on the resource grid is a resource element, and one resource block (RB) includes 12 × 7 resource elements. The number of resource blocks included in the downlink slot! ^ Depends on the downlink transmission bandwidth.

 The structure of the uplink slot may be the same as the structure of the downlink slot.

 6 shows a downlink subframe structure in a wireless communication system to which the present invention can be applied.

Referring to FIG. 6, up to three OFDM symbols in the first slot in a subframe are control regions to which control channels are allocated and the rest OFDM symbols are data regions to which the Physical Downlink Shared Channel (PDSCH) is allocated. Examples of the downlink control channel used in 3GPP LTE include a PCFICH (Physical Control Format Indicator Channel), PDCCH (Physical Downlink Control Channel), PHICH (Physical Hybrid-ARQ Indicator Channel).

 The PCFICH is transmitted in the first OFDM symbol of a subframe and carries information about the number of OFDM symbols (ie, the size of the control region) used for transmission of control channels in the subframe. PHICH is a male answer channel for the uplink and a PHQ for a hybrid automatic repeat request (HARQ).

Carries ACK (Acknowledgement) / NACK (Not -Acknowledgement) signals. Control information transmitted through the PDCCH is called downlink control information (DCI). The downlink control information includes uplink resource allocation information, downlink resource allocation information, or an uplink transmission (Tx) power control command for an arbitrary terminal group.

PDCCH is a resource allocation and transmission format of DL-SCH (Downlink Shared Channel) (also called DL grant), resource allocation information of UL-SCH (Uplink Shared Channel) (UL grant) Upper layer control such as paging information on the paging channel (PCH), system information on the DL-SCH, and random access response transmitted on the PDSCH. Resource allocation for messages, in any terminal group It can carry a set of transmission power control commands for individual terminals, activation of Voice over IP (VoIP), and the like. The plurality of PDCCHs may be transmitted in the control region, and the terminal may monitor the plurality of PDCCHs. The PDCCH consists of a set of one or a plurality of consecutive CCEs. CCE is a logical allocation unit used to provide a PDCCH with a coding rate according to the state of a radio channel. The CCE corresponds to a plurality of resource element groups. The format of the PDCCH and the number of available bits of the PDCCH are determined according to the association between the number of CCEs and the coding rate provided by the CCEs.

The base station determines the PDCCH format according to the DC industry to be transmitted to the terminal, and attaches a CRC (Cyclic Redundancy Check) to the control information. In the CRC, a unique identifier (referred to as RNTI (Radio Network Temporary Identifier)) is masked according to the owner or purpose of the PDCCH. If the PDCCH for a specific terminal, a unique identifier of the terminal, for example, a C-RNTI (Cell-RNTI) may be masked to the CRC. Or, if the PDCCH for the paging message may be masked to the paging indication identifier, for example, P- RNTK Paging-RNTI) 7> CRC. If the system information, more specifically, PDCCH for the system information block (SIB), the system information identifier and the system information RNTI (SI-RNTI) may be masked to the CRC. In order to indicate a random access response, which is a response to the transmission of the random access preamble of the UE, it may be masked in a RA-RNTI (RA-RNTI) 7} CRC. 7 illustrates an uplink subframe in a wireless communication system to which the present invention can be applied. Arbitrary structure is shown.

 Referring to FIG. 7, an uplink subframe may be divided into a control region and a data region in the frequency domain. A physical uplink control channel (PUCCH) carrying uplink control information is allocated to the control region. In the data area, a PUSCH (Physical Uplink Shared Channel) for carrying user data is allocated. A resource block (RB) pair is allocated to a PUCCH for one UE in a subframe. Each of the two slots occupies different subcarriers, and the RB pair allocated to the PUCCH is called f requency hopping at a slot boundary.

RRC Connection Procedure

 In order to manage mobility of the UE in the NAS layer located in the control plane of the UE and the MME, an EPS mobility management (EMM) registered state (EMM- REGISTERED) and an EMM deregistered state (EMM-DEREGISTERED) may be defined. The EMM registration state and the EMM declassification state may be applied to the terminal and the MME. As in the case of powering on the terminal for the first time, the initial terminal is in the EMM deregistration state, and the terminal performs the process of registering to the network through an initial attach procedure to access the network. If the access procedure is successfully performed, the UE and the MME transition to the EMM registration state.

Also, manages a signaling connection between the terminal and the network. In order to do this, an EPS connection management (ECM) connected state (ECM-CONNECTED) and an ECM idle state (ECM-IDLE) may be defined. ECM connection state and ECM child state may also be applied to the UE and the MME. The ECM connection consists of an RRC connection established between the terminal and the base station and an S1 signaling connection established between the base station and the MME. The RRC state indicates whether the RRC layer of the terminal and the RRC layer of the base station are logically connected. That is, when the RRC layer of the terminal and the RRC layer of the base station is connected, the terminal is in an RRC CONNECTED state (RRC CONNECTED). If the RRC layer of the terminal and the RRC layer of the base station is not connected, the terminal is in the RRC idle state (RRC_IDLE).

The network can grasp the presence of the terminal in the ECM connection state in units of sal and can effectively control the terminal. On the other hand, the network cannot grasp the presence of the UE in the ECM idle state, and the core network (CN) manages the tracking area unit which is larger than the cell. When the terminal is in the ECM idle state, the terminal performs Discontinuous Reception (DRX) set by the NAS using a uniquely assigned ID in the tracking area. That is, the terminal may receive a broadcast of system information and paging information by monitoring a paging signal at a specific paging opportunity every UE-specific paging DRX cycle. In addition, when the terminal is in the ECM idle state, the network does not have the context information of the terminal. Therefore, the UE in the ECM idle state does not need to receive a network command and selects cell selection or cell reselection. UE-based mobility related procedures such as reselection) may be performed. In the ECM children state, if the location of the UE is different from the location of the network, the UE may inform the network of the location of the UE through a tracking area update (TAU) procedure. On the other hand, when the terminal is in the ECM connection state, the mobility of the terminal is managed by the command of the network. In the ECM connection state, the network knows the cell to which the UE belongs. Accordingly, the network may transmit and / or receive data to or from the terminal, control mobility such as handover of the terminal, and perform cell measurement on neighboring cells.

 As described above, in order to receive a normal mobile communication service such as voice or data, the terminal needs to transition to an ECM connection state. As in the case of powering on the terminal for the first time, the initial terminal is in the ECM idle state as in the EMM state, and when the terminal successfully enters the network through an initial attach procedure, the terminal and the MME transition to the ECM connection state. (transition) In addition, if the terminal is registered in the network but the traffic is deactivated and the radio resources are not allocated, the terminal is in the ECM idle state, and if new uplink or downlink traffic is generated, the service request procedure is performed. UE and MME is transitioned to the ECM connection state through.

 8 is a flowchart illustrating a process of establishing an RRC connection in a wireless communication system to which the present invention can be applied.

UE requests RRC connection (RCC connection request) The message is transmitted to the base station (S510). The base station transmits an RRC connection setup message in response to the RRC connection request (S802). After receiving the RRC connection setup message, the terminal enters the RRC connection mode.

 The terminal transmits an RRC connection setup complete message 1 used to confirm successful completion of RRC connection establishment to the base station (S803).

 9 is a flowchart illustrating a RRC connection resetting process in a wireless communication system to which the present invention can be applied.

 RRC connection reconfiguration is used to modify an RRC connection. It is used to establish / modify / release RBs, perform handovers, and set up / modify / release measurements.

 The base station transmits an RRC connection reconfiguration message for modifying the RRC connection to the terminal (S901). In response to the RRC connection reconfiguration, the UE transmits an RRC connection reconfiguration complete message, which is used to confirm successful completion of the RRC connection reconfiguration, to the base station (S902). Uplink Resource Allocation Procedure

In the 3GPP LTE / LTE-A system, a scheduling-based data transmission / reception method of a base station is used to maximize resource utilization. This means that the terminal has data to send In this case, it means that the base station may first request uplink resource allocation and transmit data using only the uplink resources allocated from the base station.

 10 is a diagram illustrating an uplink resource allocation process of a terminal in a wireless communication system to which the present invention can be applied.

 In order to efficiently use the uplink radio resource, the base station must know what kind of data for each terminal and how much to transmit uplink. Accordingly, the terminal directly transmits information about uplink data to be transmitted by the terminal to the base station, and the base station may allocate uplink resources to the corresponding terminal based on the information. In this case, the information on the uplink data delivered to the base station by the terminal is the amount of uplink data stored in its buffer, which is called a buffer status report (BSR). The BSR is transmitted using a MAC control element when the terminal is allocated resources on the PUSCH in the current TTI and a reporting event is triggered.

 FIG. 10A illustrates an uplink resource allocation process for actual data when an uplink radio resource for buf fer status reporting (BSR) is not allocated to the terminal. . That is, in the case of the UE that switches the state of the active mode in the DRX mode, since there is no data resource allocated in advance, it is required to request a resource for uplink data starting with the SR transmission through the PUCCH. Resource allocation procedures are used.

Referring to FIG. 10A, the UE allocates a PUSCH resource for transmitting a BSR. If not, the UE first transmits a scheduling request (SR) to the base station in order to receive the PUSCH resource (S1001).

 The scheduling request is used to request a base station to receive a PUSCH resource for uplink transmission when a reporting event occurs but the terminal is not scheduled with a radio resource on the PUSCH in the current TTI. That is, the UE transmits the SR on the PUCCH when the regular BSR is triggered but does not have an uplink radio resource for transmitting the BSR to the base station. The UE transmits the SR through the PUCCH or initiates a random access procedure according to whether the PUCCH resources for the SR is configured. Specifically, the PUCCH resources to which the SR can be transmitted are the PRB to which the SR is transmitted, the cyclic shift (CS) applied to the basic sequence (eg, ZC sequence) for spreading the frequency domain of the SR, and the time domain of the SR. It can be determined by a combination of orthogonal codes (OC) for spreading. In addition, it may include SR periodicity and SR subframe offset information. PUCCH resources to which the SR can be transmitted may be configured by an upper layer (eg, an RRC layer) in a UE specific manner.

 Upon receiving the UL grant for the PUSCH resource for the BSR transmission from the base station (S1002), the terminal transmits the triggered BSR to the base station through the PUSCH resource allocated by the UL grant (S1003).

The base station identifies the amount of data to be transmitted by the actual terminal to the uplink through the BSR and transmits a UL grant for the PUSCH resource for actual data transmission to the terminal. (S1004). The terminal receiving the UL grant for the actual data transmission transmits the actual uplink data to the base station through the allocated PUSCH resources (S1005).

 FIG. 10B illustrates an uplink resource allocation process for actual data when an uplink radio resource for a BSR is allocated to the terminal.

 Referring to (b) of FIG. 10, when the UE has already allocated the PUSCH resource for BSR transmission, the UE transmits the BSR through the allocated PUSCH resource and transmits a scheduling request to the base station (S1006). ). Subsequently, the base station checks the amount of data to be transmitted by the actual terminal on the uplink through the BSR and transmits a UL grant for the PUSCH resource for actual data transmission to the terminal (S1007). Upon receiving the UL grant for the actual data transmission, the UE transmits the actual uplink data to the base station through the allocated PUSCH resource (S1008).

D2D (Device-to-Device) Communication

 Device-to-Device (D2D) communication technology refers to a method in which geographically close terminals communicate directly without passing through an infrastructure such as a base station. D2D communication technology has been developed using the unlicensed frequency bands, such as Wi-Fi Direct and Bluetooth, which have already been commercialized. However, the development and standardization of D2D communication technology using licensed frequency bands is underway to improve frequency utilization efficiency of saller systems.

In general, D2D communication refers to communication between things or things intelligent communication. Although the term is limitedly used, the D2D communication in the present invention may include not only a simple device equipped with a communication function, but also communication between various types of devices having a communication function such as a smartphone or a personal computer.

 11 is a diagram for conceptually explaining D2D communication in a wireless communication system to which the present invention can be applied.

 11 (a) shows an existing base station-oriented communication scheme, the terminal KUE 1 may transmit data to the base station on the uplink, and the base station may transmit data to the terminal 2 (UE 2) on the downlink. have. Such a communication method may be referred to as an indirect communication method through a base station. In the indirect communication scheme, an unlink (a link between base stations or a link between a base station and a repeater, which may be referred to as a backhaul link) and / or a Uu link (a link or a repeater between a base station and a terminal) that is a link defined in a conventional wireless communication system As a link between the terminal and the terminal), which may be referred to as an access link).

 FIG. 11B illustrates a UE-to-UE communication scheme as an example of D2D communication, and data exchange between terminals may be performed without passing through a base station. Such a communication method may be referred to as a direct communication method between devices. The D2D direct communication method has advantages such as reduced latency and less radio resources compared to the indirect communication method through the existing base station.

12 illustrates an example of various scenarios of D2D communication to which the method proposed in the specification may be applied. The scenario of D2D communication is largely determined by (1) Out-of-Coverage Network, (2) Partially depending on whether UE1 and UE2 are located within cell coverage / out-of-coverage. -It can be divided into Coverage Network and (3) In- Coverage Network.

 In the case of an in-coverage network, it may be divided into In-Coverage-Single-Cell and In-Coverage-Multi—Cell according to the number of cells corresponding to the coverage of the base station.

 12 (a) shows an example of an Out-of-Coverage Network scenario of D2D communication.

 The out-of-coverage network scenario refers to performing D2D communication between D2D terminals without control of a base station.

 In FIG. 12 (a), only the terminal 1 and the terminal 2 exist, and the terminal 1 and the terminal 2 can be seen that the direct communication.

 12 (b) shows an example of a partial-coverage network scenario of D2D communication.

 Partial-Coverage Network scenario refers to performing D2D communication between a D2D UE located in network coverage and a D2D UE located outside network coverage.

In FIG. 12B, it can be seen that terminal 1 located in network coverage and terminal 2 located outside network coverage communicate. Figure 12 (c) is an example of the In-Coverage-Single-Cell human scenario, Figure 3 (d) is

An example of an In-Coverage-Multi-Cell scenario is shown.

 In-coverage network scenario refers to D2D UEs performing D2D communication under the control of a base station within network coverage.

 In FIG. 12C, UE 1 and UE 2 are located in the same network coverage (or cell) and perform D2D communication under the control of a base station.

 In FIG. 12 (d), UE 1 and UE 2 are located in different network coverages, although they are located in network coverage. In addition, the terminal 1 and the terminal 2 performs the D2D communication under the control of the base station for managing each network coverage.

 Hereinafter, the D2D communication will be described in more detail.

 D2D communication may operate in the scenario shown in FIG. 3, but may generally operate in network coverage and out-of-coverage. A link used for D2D communication (direct communication between terminals) may be referred to as a D2D link, a directlink, or a sidelink, but is referred to as a side link for convenience of description below. It explains.

Side link transmission may operate in the uplink spectrum in the case of FDD and operate in an uplink (black is downlink) subframe in the case of TDD. Time division multiplexing (TDM) may be used for multiplexing of side link transmission and uplink transmission. Side link transmission and uplink transmission do not occur simultaneously. Side link transmission does not occur in an uplink subframe used for uplink transmission or in a side link subframe partially or wholly overlapping with UpPTS. In addition, the transmission and reception of the side link also do not occur simultaneously.

 The structure of a physical resource used for side link transmission may have the same structure of an uplink physical resource. However, the last symbol of the side link subframe consists of a guard period and is not used for side link transmission.

 The side link subframe may be configured by extended CP or normal CP.

 D2D communication can be broadly classified into discovery, direct communication, and synchronization.

 1) discovery

 D2D discovery may be applied within network coverage. (Including inter-cell and intra-cell). Both synchronous or asynchronous cell placement in inter-cell discovery can be considered. The D2D discovery may be used for various commercial purposes such as advertisements, coupon issuance, and friend search for the terminal in the proximity region.

When UE 1 has a role of transmitting a discovery message, UE 1 transmits a discovery message and UE 2 receives a discovery message. The transmission and reception roles of the terminal 1 and the terminal 2 may be changed. The transmission from the terminal 1 and the terminal 2 May be received by the same one or more terminal (s).

 The discovery message may include a single MAC PDU, where the single MAC PDU may include a terminal identifier (ID) and an application identifier (application ID).

 A physical sidelink discovery channel (PSDCH) may be defined as a channel for transmitting a discovery message. The structure of the PSDCH channel may reuse the PUSCH structure.

 Two types of types (Type 1 and Type 2) may be used as a resource allocation method for D2D discovery.

 In the case of type 1, the base station may allocate resources for transmission of the discovery message in a non-UE specific manner.

 Specifically, a radio resource pool for discovery transmission and reception consisting of a plurality of subframe sets and a plurality of resource block sets is allocated within a specific period (hereinafter, 'discovery period'), and the discovery transmitting terminal Randomly selects a specific resource in the radio resource pool and transmits a discovery message.

This periodic discovery resource pool can be allocated for discovery signal transmission in a semi-static manner. The configuration information of the discovery resource pool for discovery transmission includes a discovery period, subframe set and resource block set information that can be used for transmission of a discovery signal within the discovery period. The configuration information of the discovery resource pool is an upper layer signal. It can be sent to the terminal by the ring. In the case of an in-coverage terminal, a discovery resource pool for discovery transmission may be set by the base station and inform the terminal using RRC signaling (for example, System Information Block (SIB)). A discovery resource pool allocated for discovery within a period may be multiplied by TDM and / or FDM as a time-frequency resource block with the same size, and 'discovered' a time-frequency resource block with this same size. A discovery resource may be referred to as 'discovery resource'. The discovery resource may be divided into one subframe unit, and may include two physical resource blocks (PRBs) per slot in each subframe. One discovery resource may be used for transmission of a discovery MAC PDU by one UE.

In addition, the terminal may repeatedly transmit a discovery signal within a discovery period for transmitting one transport block. Transmission of a MAC PDU transmitted by one UE is repeated in a discovery cycle (ie, a radio resource pool) in a contiguous or non-contiguous manner (for example, four times). Can be The number of transmissions of the discovery signal for one transport block may be transmitted to the terminal by higher layer signaling.

The UE randomly selects a first discovery resource from a discovery resource set that can be used for repeated transmission of the MAC PDU, and other discovery resources may be determined in relation to the first discovery resource. For example, a certain pattern is set in advance and the first selected by the terminal. The next discovery resource may be determined according to a preset pattern according to the location of the resource resource. In addition, the UE may arbitrarily select each discovery resource in the discovery resource set that can be used for repeated transmission of the MAC PDU. In type 2, resources for discovery message transmission are allocated to be UE specific. Type 2 is further subdivided into Type 2A (Type-2A) and Type 2B (Type-2B). Type 2A is a method in which a base station allocates resources to each instance when a discovery message is transmitted within a discovery period, and type 2B is a method in which resources are allocated in a semi-persistent manner.

 In the case of Type 2B, the RRC CONNECTED UE requests allocation of resources for transmission of the D2D discovery message to the base station through RRC signaling. The base station may allocate resources through RRC signaling. When the terminal transitions to the RRC_IDLE state or when the base station withdraws the resource allocation through RRC signaling, the terminal releases the most recently allocated transmission resource. As such, in the case of type 2B, radio resources may be allocated by RRC signaling, and activation / deactivation of radio resources allocated by PDCCH may be determined.

 A radio resource pool for receiving a discovery message may be set by the base station and inform the terminal using RRC signaling (eg, a system information block (SIB)).

The discovery message receiving terminal monitors both the discovery resource pools of type 1 and type 2 described above to receive the discovery message. 2) direct communication

 The coverage area of D2D direct communication includes not only network coverage (out-of-coverage) but also network coverage edge (edge-of-coverage). D2D direct communication can be used for purposes such as PS (Public Safety). When the terminal 1 has a role of direct communication data transmission, the terminal 1 transmits the direct communication data, the terminal 2 receives the direct communication data. The transmission and reception roles of the terminal 1 and the terminal 2 may be changed. The direct communication transmission from terminal 1 may be received by one or more terminal (s), such as terminal 2.

 D2D discovery and D2D communication may be independently defined without being associated with each other. That is, D2D discovery is not required for groupcast and broadcast direct communication. As such, when D2D discovery and D2D direct communication are defined independently, UEs do not need to recognize neighboring UEs. In other words, in the case of groupcast and broadcast direct communication, it does not require that all receiving terminals in the group come close to each other.

A physical side link shared channel (PSSCH) may be defined as a channel for transmitting D2D direct communication data. In addition, a physical sidelink control channel (PSCCH: Physical Sidelink) is a channel for transmitting control information (eg, scheduling assignment (SA), transmission format, etc.) for D2D direct communication. Control Channel) can be defined. PSSCH and PSCCH may reuse the PUSCH structure. As a resource allocation method for D2D direct communication, two modes (mode 1 and mode 2) may be used.

 Mode 1 refers to a method of scheduling a resource used by the base station to transmit data or control information for D2D direct communication to the terminal. Mode 1 is applied for in-coverage.

 The base station sets up a resource pool for D2D direct communication. Here, a resource pool required for D2D communication may be divided into a control information pool and a D2D data pool. When the base station schedules the control information and the D2D data transmission resource within the pool configured for the transmitting D2D terminal using the PDCCH or the ePDCCH, the transmitting D2D terminal transmits the control information and the D2D data using the allocated resources.

 The transmitting terminal requests a transmission resource from the base station, and the base station schedules a resource for transmission of control information and D2D direct communication data. That is, in mode 1, the transmitting terminal must be in the RRC_CONNECTED state to perform D2D direct communication. The transmitting terminal transmits a scheduling request to the base station, and then a BSR (Buf fer Status Report) procedure is performed so that the base station can determine the amount of resources requested by the transmitting terminal.

Receiving terminals may monitor the control information pool and decode the control information related to itself to selectively decode the D2D data transmission related to the control information. The receiving terminal may not decode the D2D data pool according to the control information decoding result. Mode 2 refers to a method in which the UE randomly selects a specific resource from a resource pool in order to transmit data or control information for D2D direct communication. Mode 2 applies for out-of-coverage and / or edge-of-coverage.

 In the mode 2, a resource pool for transmitting control information and / or a resource pool for D2D direct communication data transmission may be pre-configured or semi-statically configured. The terminal receives the configured resource pool (time and frequency) and selects a resource for D2D communication transmission from the resource pool. That is, the terminal may select a resource for transmitting control information from the control information resource pool to transmit the control information. In addition, the terminal may select a resource from the data resource pool for D2D direct communication data transmission.

 In D2D broadcast communication, control information is transmitted by the broadcasting terminal. The control information explicitly and / or implicitly indicates the location of a resource for data reception in relation to a physical channel (ie, PSSCH) carrying D2D direct communication data. (implicit) Get 1

 3) synchronization

The D2D Synchronization Signal (D2DSS) may be used by a terminal to obtain time-frequency synchronization. In particular, since the control of the base station is not possible outside the network coverage, new signals and procedures for establishing synchronization between terminals may be defined. The D2D synchronization signal may be referred to as a sidelink synchronization signal. A terminal that periodically transmits a D2D synchronization signal may be referred to as a D2D synchronization source or a sidelink synchronization source. When the D2D synchronization source is a base station, the structure of the transmitted D2D synchronization signal may be the same as that of the PSS / SSS. If the D2D synchronization source is not the base station (for example, UE or Global Navigation Satellite System (GNSS), etc.), the structure of the D2D synchronization signal transmitted may be newly defined.

 The D2D synchronization signal is transmitted periodically with a period not less than 40ms. Each UE may have multiple physical-layer D2D synchronization identities. The physical layer D2D synchronization identifier may be referred to as a physical-layer sidelink synchronization identity or simply a D2D synchronization identifier.

 The D2D synchronization signal includes a D2D primary synchronization signal / sequence and a D2D secondary synchronization signal / sequence. This may be referred to as a primary sidelink synchronization signal and a secondary sidelink synchronization signal, respectively.

Before transmitting the D2D synchronization signal, the terminal may first search for a D2D synchronization source. And, if the D2D synchronization source is found, the terminal from the searched D2D synchronization source Time-frequency synchronization may be obtained through the received D2D synchronization signal. The terminal may transmit a D2D synchronization signal.

 In addition, a channel for the purpose of delivering essential information used for communication between terminals together with synchronization may be required, and a channel for this purpose may be defined. Such a channel may be referred to as a physical D2D synchronization channel (PD2DSCH) or a physical sidelink broadcast channel (PSBCH).

In the following, direct communication between two devices in D2D communication is described as an example for clarity, but the scope of the present invention is not limited thereto, and the same as described in the present invention for D2D communication between two or more devices is described. The principle can be applied.

D2D discovery

 Hereinafter, in the present patent, a signal (or message) periodically transmitted by terminals for D2D discovery may be referred to as a discovery message, a discovery signal, a beacon, and the like. Hereinafter, for the convenience of description, collectively referred to as a discovery message. In distributed discovery, a dedicated resource may be periodically allocated as a resource for the UE to transmit and receive a discovery message separately from the cell resource. This will be described with reference to FIG. 13 below.

13 is a distributed discovery in a wireless communication system to which the present invention can be applied. A diagram for explaining a resource allocation method.

 Referring to FIG. 13, in a distributed discovery scheme, a discovery subframe (that is, a 'discovery resource pool') 1301 for discovery among all uplink frequency-time resources is fixedly (or exclusively) allocated. In addition, the remaining area is composed of an existing LTE uplink wide area network (WAN) subframe area 1302. The discovery resource pool may consist of one or more subframes.

 The discovery resource pool may be periodically allocated at a predetermined time interval (ie, a 'discovery period ᅳ). In addition, the discovery resource pool may be set repeatedly in one discovery period.

 In the case of FIG. 13, a discovery resource pool is allocated with a discovery period of 10 sec, and each discovery resource pool is an example in which 64 consecutive subframes are allocated. However, the size of the discovery period and the time / frequency resources of the discovery resource pool corresponds to an example, and the present invention is not limited thereto.

 The UE selects a resource (ie, 'discovery resource') for transmitting its discovery message in a dedicated allocated discovery pool by itself and transmits a discovery message through the selected resource. This will be described with reference to FIG. 14 below.

FIG. 14 is a diagram briefly illustrating a discovery process of a terminal using a distributed discovery resource allocation method in a wireless communication system to which the present invention can be applied. Referring to FIGS. 13 and 14, the discovery expression is largely referred to as resource sensing (S1401) for transmitting a discovery message, resource selection (S1402) for transmitting a discovery message, transmission and reception of a discovery message (S1403), and three such steps. It consists of a procedure.

 First, in a resource sensing step (S1401) for transmitting a discovery message, all terminals performing D2D discovery are distributed in a distributed manner (ie, themselves) during one period (ie, discovery resource pool) of D2D discovery resources. Receive (ie, sense) all discovery messages. For example, assuming that the uplink bandwidth is 10 MHz in FIG. 13, all UEs transmit PUCCH transmissions in a total of 50 RBs since N = 44 RB (the total uplink bandwidth is 10MHZ) during K = 64 msec (64 subframes). 6 RBs are used to receive all the discovery messages transmitted from ().

 In step S1402 of resource selection for transmitting a discovery message, the UE classifies resources of a low energy level among the sensed resources and within a certain range (for example, lower X (x = any integer, 5, 7, 10, ...)) randomly select a discovery resource.

The discovery resource may be composed of one or more resource blocks having the same size, and may be multiplexed with TDM and / or FDM in the discovery resource pool. The reason why the UE selects a low energy level resource as a discovery resource is because the UEs select the same D2D discovery resource when the resource is a low energy level resource. This can be interpreted to mean that it is not used much. That is, this proves that there are not many UEs that perform the D2D discovery procedure causing interference in the surroundings. Therefore, when selecting a resource having such a low energy level, there is a high probability that interference is small when transmitting a discovery message.

 In addition, the reason for randomly selecting a discovery resource in a predetermined range (that is, within the lower x%) without selecting a resource having the lowest energy level is that when a resource having the lowest energy level is selected, several terminals are identical to each other. This is because there is a possibility of selecting a resource corresponding to the lowest energy level. That is, a lot of interference may be caused by selecting a resource corresponding to the same lowest energy level. Therefore, it is desirable to select randomly within a predetermined range (that is, constitute a candidate pool of selectable resources). Here, for example, the range of the energy level may be set variably according to the design of the D2D system.

 In step S1403, which is a final procedure, the UE transmits and receives a discovery message on the basis of the selected discovery resource after a period of discovery (after P = 10 seconds in the example of FIG. 13). The UE periodically transmits and receives a discovery message according to a random resource hopping pattern.

The D2D discovery procedure is performed not only in the RRC_CONNECTED state in which the UE is connected to the base station, but also continues in the RRC_IDLE state in which the UE is not connected to the base station. In consideration of the discovery method as described above, all the terminals sense all the resources (ie, discovery resource pool) transmitted by the surrounding terminals, and randomly discover the discovery resources within a certain range (for example, lower). Choose.

D2D direct communication

 Hereinafter, methods for transmitting and receiving D2D control information and / or D2D data proposed in the present specification will be described in detail.

 The D2D control information may be referred to as sidelink control information (SCI) or scheduling assignment (SA). As described above, the D2D control information may be transmitted on the PSCCH, and the D2D data may be transmitted on the PSSCH. Hereinafter, the D2D control information is referred to as SA.

 FIG. 15 is a diagram for explaining a method of transmitting and receiving signaling for D2D direct communication in a wireless communication system to which the present invention can be applied.

 15 illustrates a method of performing D2D communication by transmitting and receiving a D2D operation procedure and related information in a D2D operation procedure (D2D communication mode 1) under the control of a base station.

As shown in FIG. 15, a Scheduling Assginment (SA) resource pool 1510 and / or a data resource pool 1520 related to D2D communication may be configured in advance. The configured resource pool is a D2D UE in the base station through high layer signaling. May be sent to the network.

 The higher layer signaling may be RRC signaling.

 As used herein, the expressions of A and / or B 'can be interpreted as a concept meaning at least one of A or B symptoms (representing A, B or A & B).

 The SA resource pool and / or data resource pool means resources reserved for UE-to-UE (D2D) or D2D communication.

 The UE-to—UE link may be represented as a sidelink. Specifically, an SA resource pool means a resource region capable of transmitting SA, and a data resource pool indicates a resource region capable of transmitting D2D data. it means.

 The SA may be transmitted according to the SA period 1530, and the D2D data may be transmitted according to the data transmission period 1540.

 The SA period and / or the data transmission period may be transmitted from the base station to the D2D terminal through the D2D grant.

 Alternatively, the SA period may be transmitted through a D2D grant, and the data transmission period may be transmitted through an SA.

 Here, the D2D grant represents downlink control information (DCI) required for SA and D2D data transmission transmitted by the base station to the D2D terminal.

The D2D grant may be expressed in DCI format 5 and may be transmitted through a physical layer channel or a MAC layer channel such as PDCCH, EPDCCH, or the like. In addition, the D2D grant may include information related to data transmission as well as information related to SA transmission.

 The SA may include, for example, a resource allocation (RA), an MCS, a new data indicator (NDI), a redundancy version (RV), or the like.

 As described above, the SA resource pool for SA transmission may be transmitted through RRC signaling.

 In addition, the SA may be transmitted through a physical side link control channel (PSCCH), and the D2D data may be transmitted through a physical sidelink shared channel (PSSCH).

 The D2D transmitting terminal may receive SA information, in particular, resource allocation (RA) information (hereinafter, referred to as 'SA RA' information) from which the SA can be transmitted through the D2D grant.

 At this time, the D2D transmitting terminal transmits the SA RA information received from the base station to the D2D receiving terminal as it is or generates new SA RA information by referring to the received SA RA information, and then generates the newly generated SA RA information. It may be transmitted to the D2D receiving terminal.

 Here, when the D2D transmitting terminal newly generates the SA RA, the D2D transmitting terminal should perform resource allocation of the SA only within a resource pool indicated by the D2D grant RA.

That is, part of the resource area (D2D grant RA) that the eNB allows to use It indicates that the SA can be transmitted by selecting only the resource area (SA RA).

 Alternatively, on the contrary, the D2D transmitting UE may use the D2D grant RA allocated by the eNB.

 16 is a view for explaining a method for transmitting downlink control information for D2D direct communication in a wireless communication system to which the present invention can be applied.

 First, an SA resource pool and / or a D2D data resource pool related to D2D communication are configured by a higher layer (S1610).

 Thereafter, the base station transmits the SA resource pool and / or the D2D data resource pool to the D2D user equipment through higher layer signaling (S1620).

 Thereafter, the base station transmits the control information related to the SA and / or the control information related to the D2D data to the D2D transmitting terminal through the D2D grant, respectively or together (S1630). The control information includes scheduling information of SA and / or D2D data in the SA resource pool and / or the D2D data resource pool. For example, RA, MCS, NDI, RV, and the like may be included.

 Thereafter, the D2D transmitting terminal transmits SA and / or D2D data to the D2D receiving terminal based on the information received in step S1630 (S1640).

 The SA transmission and the transmission of the D2D data may be performed together, or the transmission of the D2D data may be performed after the SA transmission.

Meanwhile, although not shown in FIG. 16, the D2D transmitting UE requests a transmission resource (ie, a PSSCH resource) for D2D data from the base station, and the base station transmits SA and D2D data. Scheduling resources for To this end, the D2D transmitting UE may send a Scheduling Request (SR) to the base station, and then a BSR (Buf fer Status Report) procedure may be performed so that the base station can determine the amount of resources requested by the D2D transmitting UE. have.

 Here, since the SR is an SR for requesting PSSCH resource allocation and not a PUSCH resource, it may be distinguished from an SR for PUSCH resource request. To this end, to distinguish the SR for the PSSCH from the SR for the PUSCH, a PUCCH resource index (ie, a PRB to which the SR is transmitted) and a basic sequence (eg, ZC sequence) to spread the frequency domain of the SR. Cyclic shift CS or a combination of orthogonal codes OC for time-domain spreading of SRs may be set differently.

 The D2D Rx UEs may monitor the control information pool and decode the control information associated with the self to selectively decode the D2D data transmission associated with the control information.

 As described above, the D2D grant serves to transmit control information, that is, scheduling information, such as resource allocation, MCS, etc., required for SA and data transmission in the D2D Tx UE.

 In addition, since SCI is used for scheduling of PSSCH in terms of D2D Tx UE and D2D Rx UE, the DCI format for D2D grant proposed in the present invention is used for scheduling PSCCH and may include field information of SCI. have.

The DCI format for the D2D grant (or sidelink grant) is as described above. Although both the scheduling information for the SA and data are included, a resource allocation (allocation) field (or information) for the SA and an RA field (or information) for the data may be distinguished from each other.

 For example, the DCI format for the D2D grant may include a frequency hopping flag (FH) field, a resource allocation (RA) field for the D2D SA, a first RA field for the D2D data, and a second RA for the D2D data. Field and TPC field and zero padding (ZP) bit (s) (if present)

 The FH field indicates whether frequency hopping is applied to SA and data transmission. The FH field may be commonly applied to SA transmission and data transmission, and thus may be configured as one field.

 For example, when the FH field value is '1', the D2D Tx UE performs frequency hopping transmission during SA and data transmission, and when the FH field value is '0', the D2D Tx UE transmits SA and data. Do not perform frequency hopping transmission.

 The SA RA field (or PSCCH RA field, resource field for PSCCH) indicates resource information for SA transmission. That is, it indicates scheduling information (ie, resource information) for PSCCH transmission. Therefore, the D2D Tx UE transmits an SA (ie, PSCCH) in the resource indicated by the SA RA field.

Here, the SA RA field may include information (or index) for deriving a location of a time and / or frequency resource region for SA transmission. - For example, the SA RA field may indicate a start position (ie, index) of a resource for SA transmission. In other words, the SA RA field may indicate the start index of the subframe and / or resource block in which the SA is transmitted.

 In addition, the D2D Tx UE may use time resources (eg, subframe indexes) and / or frequency resources (eg, subframe indexes) for SA transmission using a predetermined function (calculation) based on information included in the SA RA field. For example, resource block index) can be derived.

 Resource allocation information for D2D data transmission may include a D2D data first RA field (or a first PSSCH RA field, a resource block assignment and hopping resource allocation field), and a D2D data second RA field (or Second PSSCH RA field, and a time resource pattern field.

 The D2D data first RA field indicates resource information (eg, resource blocking) for transmitting D2D data in the frequency domain. That is, this indicates scheduling information in the frequency domain for PSSCH transmission. Accordingly, the D2D Tx UE transmits D2D data (ie, PSSCH) in the frequency resource indicated by the D2D data first RA field.

 For example, the D2D data first RA field is allocated with a start position (ie, start resource block index) of a resource block for transmitting D2D data using a resource indication value (RIV), like the UL RA method. The length of the resource block

(length) can be specified.

In addition, the D2D data first RA field is the start of a resource block for D2D data transmission. The location (that is, the starting resource block index) and the end location (that is, the last resource block index) may be distinguished by separate fields (or information). In this case, additional bits (eg 1 bit) may be needed.

 The D2D data second RA field indicates resource information (eg, a subframe) used for D2D data transmission in the time domain. That is, this indicates scheduling information in the time domain for PSSCH transmission. Accordingly, the D2D Tx UE transmits D2D data (ie, PSSCH) in a time resource indicated by the D2D data second RA field.

 For example, the D2D data second RA field may indicate a subframe pattern (ie, time resource pattern) to be used for D2D data transmission. That is, the D2D data second RA field may include information indicating a time resource pattern used for PSCCH transmission.

 Here, the D2D data second RA field may indicate any one pattern among a plurality of predetermined time resource patterns. For example, n subframe patterns (represented in bitmaps) are predefined and defined, such as SF pattern # 0 (10001010), SF pattern # 1 (00111001), ..., SF pattern #n (10011001). Any one subframe pattern may be indicated among the n subframe patterns. Here, a value of '1' of the bitmap may mean that D2D data is transmitted in a corresponding subframe, and a value of '0' may mean that D2D data is not transmitted in a corresponding subframe. It may also have the opposite meaning.

The TPC field indicates transmit power for SA and data transmission in the D2D Tx UE. That is, the transmission power information of the PSCCH and the PSSCH is indicated.

 The TPC field 4205 may consist of one field. As such, when the TPC field consists of one field, the TPC field value is commonly applied to transmit power for SA and data transmission.

 The ZP may be filled with control information, not used, or may not exist as needed. In other words, it can be omitted if it is not necessary.

 The order of each field and the number of bits of each field of the DCI format illustrated above are just one example for convenience of description, and may be changed.

 Meanwhile, compared with the DCI format 0, the DCI format for the D2D grant illustrated above does not include an MCS field.

 If the eNB informs the D2D Tx UE of the MCS value, the MCS field should exist in the DCI format for the D2D grant. However, the MCS value may be determined by the D2D Tx UE by itself, or may be delivered by higher layer signaling (eg, RRC signaling) or fixed to a predetermined value. Therefore, the MCS field may not be included in the D2D grant.

In addition, the DCI format for the above-described D2D grant does not include an NDI field and an RV field. As above, the NDI and RV values may be determined by the D2D Tx UEs themselves, or may be delivered through higher layer signaling (eg, RRC signaling) or may be predetermined. Position measuring method of the D2D UE>'Figure 17 is a diagram illustrating a scenario for measuring the position of the UE by using the D2D signal / channel according to an embodiment of the present invention.

 In the present invention, as shown in FIG. 17, the UE proposes a method of measuring a location of a counterpart UE or a distance between the counterpart UE and itself by using a signal for transmitting and receiving a D2D direct radio channel / signal with another UE.

 If the UE can determine the location of the other UE or the distance from the other UE can provide a variety of useful services. For example, if you can determine the distance of another user who is registered as a friend of a user, if the corresponding friend is located within a certain distance, the user can be notified of such fact, and the service can be provided to find out who is nearby. have. As another example, when a plurality of UEs transmit a message such as an advertisement, the user may enable an operation of setting only to receive an advertisement message existing within a certain distance from the UE. As another example, the user may be provided with a service that notifies a user by observing whether a UE registered as an object of interest exists within a certain area or a distance from the user.

As a technique for identifying the location information of a UE in a wireless communication system, there is a series of techniques for receiving a signal transmitted by an eNB and determining its location based on the UE. In this technique, a UE measures a signal transmitted by an eNB (for example, a Positioning Reference Signal (PRS) of 3GPP LTE / LTE-A) to determine a transmission signal from each eNB for a plurality of eNBs. Arrival time or transmission from two eNBs The location of the UE is determined by measuring the difference in the arrival time of the signal.

 More specifically, when the principle is described, when the UE measures the difference between arrivals of the transmission signals at the two eNBs, it is possible to determine the difference in distance from the two eNBs. In addition, it can be seen that the UE is located at a point on the curve where the difference in distance from two eNBs is constant. If this process is repeated for the other two eNBs, it is possible to obtain several curves on which the UE can be located, and it can be seen that ϋΕ is located at the point where the curves meet.

 In practice, this operation requires the location information of the eNB, which the UE measures. When the UE reports the difference between the arrival time of the transmission signal from the eNB and the arrival time of the transmission signal from the two eNBs, the network determines which eNB Since we already know where it is located, we can determine the location of the UE through the above process. Another technique for identifying the location information of a UE in a wireless communication system is a series of techniques in which the eNB receives a signal transmitted by the UE and the network determines the location of the UE based on the eNB.

In this technique, a UE transmits a specific signal (for example, a sounding reference signal of 3GPP LTE / LTE-A) and the arrival time of a transmission signal from the UE at each eNB while receiving it by a plurality of eNBs. Or measure the difference in the arrival time of the transmission signal from the UE at the two eNBs. Then, the network may calculate the difference between the distance between the UE at each eNB or the distance from the corresponding UE at the two eNBs, based on the position information of each eNB held in advance, and the operation is repeated for several eNBs. In this case, the common appearing point may be identified as a point where the corresponding UE is located. However, the above-described operations for measuring the location of the existing UE are inadequate to be widely used when one UE tries to determine the location of a specific other UE. First of all, the network finally determines the location of the UE, so if a specific UE wants to use the location information of another UE, the network measures the location through a series of operations with the UE to be measured. The information should be delivered to the UE. In this process, not only signaling overhead occurs between the network and the UE, but when the number of UEs becomes very large, the computational complexity required for the network to calculate the location of each UE greatly increases. In particular, when the information desired by the UE corresponds to partial information such as distance from the target UE and not the exact location of the target UE, such signaling overhead or computational complexity may be unnecessary.

In order to solve this problem, the present invention transmits and receives a D2D channel / signal (eg, PSDCH, PSBCH, D2D synchronization signal, D2D reference signal, etc.) directly between the UE and the UE. We propose a location and distance measurement method between UEs that minimizes the computational complexity in dimensions. Hereinafter, in the present invention, it is assumed that each UE transmits a signal indicating its presence according to a predetermined rule. For example, the signal may correspond to a discovery signal / message (ie, PSDCH), a D2D synchronization signal, a D2D broadcast channel (ie, PSBCH), and a D2D reference signal. Discer The signal will be collectively described as a discovery signal (DS).

 According to the rules of DS transmission, a UE that receives a specific DS is designed to determine who is the UE that transmitted the DS. In one example, the DS may include identity information of the transmitting UE.

 Here, the DS transmission rule includes a method for generating a DS by each UE as described above, and a method for generating a time / frequency resource for transmitting the DS.

 The network transmits a DS transmission rule through a higher layer signal such as system information (for example, a master information block (MIB) or a system information block (SIB), etc.) or RRC signaling (for example, a broadcast scheme). ) To allow UEs participating in DS transmission and reception to grasp the rule.

 In the present invention, it is assumed that the UE, which transmits the DS, has an eNB that is a reference for determining a transmission time point. This is called a DS reference eNB.

The UE may have a plurality of DS reference eNBs. For example, the UE may transmit DS based on the eNBl as the DS reference eNB at time point 1 and transmit the DS based on the eNB2 as the DS reference eNB at time 2. Hereinafter, in the present specification, a UE that wants to measure a location of another UE by receiving a DS is referred to as an 'operation UE', and a UE that the operating UE intends to measure is ■ a target UE. It is referred to as. That is, the operation UE measures the position of the target UE or the distance between itself and the target UE by measuring the DS transmitted by the target UE. 18 illustrates a spread delay between UEs according to an embodiment of the present invention.

 18 illustrates a time point at which the target UE transmits a DS and a time point at which the operating UE receives the DS.

If eNB n is given by the DS reference target eNB, the UE determines a transmission point of the eNB DS ≤ n] DL subframe boundary (DL subframe boundary) from the time it receives.

If eNB n is a k n was transmits a downlink sub-frame boundary at time t n e NB n Slowing (propagat ion delay) between the target UE, the time that the target UE receives a DL sub-frame boundary eNB n Becomes' +],

At this point, the target UE is to transmit his forehand DS at the time the amount of time F n, F n the value may be a value fixed in advance and eojil or by the instruction of the eNB state. If the F n value is fixed in advance, it may be fixed to the same value for all DS reference eNBs.

The signal transmitted from the target UE at the time 't n + k n -F n ' reaches the operation UE through a propagation delay 'x' between the target UE and the equivalent UE. Can be represented.

 [Equation 1]

Four + k n -F n + X

The spread delay between the DS reference eNB n and the operating UE is assumed to be d n . Hereinafter, a method of obtaining the upper limit and the lower limit of the distance between the operating UE and the target UE when the DS is transmitted by the above-described process will be described.

 19 and 20 are diagrams for describing a method of measuring a distance between an operating UE and a target UE using a D2D signal / channel according to an embodiment of the present invention.

First, when x ≦ d n , an area where the target UE may be located is shown as in FIG. 19.

 The maximum value and the minimum value at the time when the operation UE receives the DS of the target UE are shown in the target UE position 1 1901 and the target UE position 2 1902, respectively.

 When the target UE is at position 1 1901, a time point at which the operating UE receives the DS of the target UE may be represented by Equation 2 below.

 [Equation 2]

u n <t n + d n + x F n + x = t n + d n -F „+ 2x

That is, when k n = d n + x is applied to Equation 1 above, the same result as Equation 2 is obtained. Here, X ≥ (u n + F n -t n -d n ) / 2 conditions are obtained.

 In addition, when the target UE is in the position 2 (1902), the time point when the operating UE receives the DS of the target UE can be expressed as Equation 3 below.

 [Equation 3]

¾≥ t n + d n -X-F n + X = n + d n -F „

That is, when k n = d n −x is applied to Equation 1 above, the same result as Equation 3 is obtained. If the target UE is in position 2 (1902), the time point at which the operating UE receives the DS of the target UE acquires a condition independent of X.

Meanwhile, when x> d n , an area where the target UE can be located is shown as shown in FIG. 20.

 The maximum value and the minimum value at the time when the operation UE receives the DS of the target UE are shown in the target UE position 1 2001 and the target UE position 2 2002, respectively.

 When the target UE is located in the location 1 (2001), the time point when the operation UE receives the DS of the target UE may be represented by Equation 4 below.

 [Equation 4]

¾≤ t n + d n + x- F n + X = f ^ + d „-¥ n + 2x

That is, applying k n = d n + x to Equation 1 above results in the same result as Equation 4. In this case, the same condition as in the case of Equation 2 is obtained.

 In addition, when the target UE is in the position 2 (2002), the time point when the operating UE receives the DS of the target UE may be represented by Equation 5 below.

 [Equation 5]

i½> t n + X-d n -F n + x = t n -d n ― F. n + 2x

That is, when k n = xd n is applied to Equation 1 above, the same result as Equation 5 is obtained. Here, Χ ≤ 0ι η + Ρ η - obtains a ^ + Α) / 2 condition.

Incorporating the above calculation results, the propagation delay 'x' between the operation UE and the target UE satisfies the following Equation (6). [Equation 6]

On fa + d n ) ^ ¾ + F t three d n )

In Equation 6, 'u n ' is a point in time at which the operating UE receives the DS transmitted by the target UE, and thus can be measured by the operating UE.

'tn + dn' may also be measured since the operating UE receives the downlink subframe boundary of the UE.

If F n is a predetermined value, the operating UE already knows the value, and if the eNB indicates to the target UE, the eNB may deliver the value or the target UE may directly notify the operating UE, for example, You can pass ^ using some fields.

ᅳ t n -d n ′ is calculated based on the measurement of 't n + d n ′ but can be calculated by the operating UE identifying d n . For example, operating the UE DS reference eNB n random access (random access) the attempt and this time eNB n is the timing advance (timing advance) the value of the operation the UE and the eNB n round trip delay (round trip delay) of the notify That is, 2 * d n . In addition, d n may be obtained from a signal transmitted by the DS reference eNB (eg, a cell reference signal (CRS), a demodulation reference signal (DMRS), channel state information (RS), a PRS, etc.). .

According to the above-described operation, the operating UE may grasp the upper limit and the lower limit for the propagation delay 'x 1 with the target UE. The upper and lower limits thus identified have different values for different DS reference eNBs. The operation ϋΕ can further narrow the range of the region where X exists by first calculating the upper and lower limits of x for each of the DS reference eNBs, and then taking the intersection of the calculated plurality of regions of X.

 When the information about the spreading delay 'x' between the operating UE and the target UE is obtained, it may be converted into a distance between the operating UE and the target UE by multiplying the propagation speed of the electromagnetic wave. Hereinafter, a method of measuring a location of a target UE using location information of a DS reference eNB and a timing of receiving a DS will be described.

 21 to 24 are diagrams for describing a method of measuring a location of a target UE using a D2D signal / channel according to an embodiment of the present invention.

As described above with reference to FIG. 18, since u n = t n + k n −F n + x, the DS transmitted by the target UE is received at the same point in time from the viewpoint of the operating UE. This means that k n + x 'computed from the point has the same value (since t n and F n are constant). Here, 'k n + x' means the spread delay of the signal reaching the operating UE from the DS reference eNB n through the target UE, so that the position of the target UE generating the same u n is the DS reference eNB n as shown in FIG. 21. And ellipses focusing on the location of the operating UE.

That is, if the operating UE measures u n and calculates k n + x based on this, the operating UE forms one ellipse and knows that the target UE is located at some point on the ellipse. FIG. 22 may identify that the target UE may exist at positions 2201 and 2202 corresponding to the intersections of the two ellipses by forming an ellipse according to the principle described with reference to FIG. 21.

 In addition, FIG. 23 corresponds to a case where the above operation is repeated for three DS reference eNBs. The intersection of the three ellipses is represented by a single point (2301) so that the position of the target UE can be fixed to one.

In FIG. 22 and FIG. 23, a nm represents the distance between DS reference eNB n and eNB m !

 As described above, in order to determine the location of the target UE by forming an ellipse in which the target UE can be located for two or more DS reference eNBs, the operating UE needs information about the location of each DS reference eNB. The information network for the location of each DS reference eNB is transmitted to the UE in advance through higher layer signals such as system information (eg, MIB (Master Information Block) or SIB (System Information Block), or RRC signaling) (eg For example, it may be notified by broadcast method.

 The location information of the DS reference eNB may be expressed in the form of absolute coordinates such as longitude and latitude of each eNB. In this case, the operating UE may grasp the target UE absolute coordinates by applying the above-described principle.

On the other hand, when measuring the distance between the target UE and the operation UE, not the position of the target UE, absolute coordinates of the DS reference eNB are not required, only relative positions. This is necessary. In this case, for example, only distance information between DS reference eNBs may be provided to the operation UE.

Referring to FIG. 23, when the target UE acquires the distance information (a nm ) between the DS reference e B n eNB m , the relative position of each eNB may be determined, and based on this, the operation of the operating UE may be applied. The relative position can also be determined. Even in this manner, the operation ϋΕ needs to know the distance from each DS reference eNB, which may be determined from the timing advance value obtained in the random access process as described above. In addition, d n may be obtained from a signal (eg, CRS, DMRS, CSI-RS, PRS, etc.) transmitted by each DS reference eNB.

 On the other hand, if the operating UE can know the distance between the target UE and the DS reference eNB, it also helps to measure the distance to the target UE or to locate the target UE.

 For example, the network may inform the operating UE of the distance between the target UE and the specific DS reference eNB, or the target UE may use the D2D signal (eg, use some bits of the DS) to inform the operating UE itself and the specific UE. Assume that the distance between the DS reference eNB is known.

In this case, the operating UE can determine the candidate position of the target UE from the DS transmitted by the target UE based on the DS reference eNB according to the principle described above with reference to FIG. 21, and the corresponding DS reference eNB and the target are shown in FIG. 24. UE company By adding a circle corresponding to the distance thereof, the candidate position of the target UE can be reduced. Hereinafter, a method of measuring the position of the target UE or the distance from the target UE using the difference in the reception time of the DS signal will be described.

25 and 26 are diagrams for describing a method of measuring a location of a target UE or a distance from the target UE using a D2D signal / channel according to an embodiment of the present invention. U n = t n + k n as described with reference to Fig 18 - F n + x Since the target UE is given by two reference DS eNB of the eNB and eNB n m reference l- UE behavior with respect to a DS and sent to each ½ If we measure the difference between these two values can determine the distance between the target UE and the two DS reference eNB.

More specifically, the difference from u n is Un - Um = t n -t m + k n -k m-

Figure imgf000076_0001
In this case, the distance X between the target UE and the operation UE, which is a common element, disappears.

As described above, the operating UE knows F n and in advance, or for convenience of operation, the two values may be described in the same manner, in which case the two components disappear.

The information of t n and 1 ^ may be derived from timing information (eg, radio frame and subframe index) at which the target UE transmits DS based on each DS reference eNB, and the time unit of a certain level or less ( For example, in the lms unit constituting the subframe, it may be assumed that the DS reference eNB is synchronized. Ie lms only If it is assumed above that two DS reference eNBs are synchronized, the operating UE may assume that the downlink subframe boundary transmitted by the two DS reference eNBs corresponds to the same time.

 According to this operation, the operation UE may calculate 3−] corresponding to the difference in distance between the target UE and the DS reference eNB from.

 Based on this, as shown in FIG. 25, a curve indicating a candidate region where a target UE may be located may be formed based on location information of two DS reference eNBs. In other words, this curve appears as a set of points where the difference in distance from two DS reference eNBs is given constant.

If this operation is performed for two different eNB combinations, another curve can be formed, and the intersection of the two curves becomes the position of the target ϋΕ. FIG. 26 corresponds to a case in which eNB2 and eNB3 are additionally performed.

 In this manner as well, the operating UE needs to know the distance from each DS reference eNB, which may be determined from a timing advance value obtained in the random access process as described above. In addition, ^ may be obtained from a signal (for example, CRS, DMRS, CSI-RS, PRS, etc.) transmitted by each DS reference eNB.

D2D terminal group management method

According to the present invention, a plurality of D2D UEs form a group so that a specific D2D in a corresponding D2D group We propose a method for efficiently maintaining or managing a group by sending and receiving appropriate messages to prevent departure from a group by managing group members centered on a terminal (for example, group leader) and a service using the same. That is, D2D signals such as D2D discovery signal (ie, PSDCH), D2D control channel (ie, PSCCH), D2D data channel (ie, PSSCH), D2D broadcast channel (ie, PSBCH), D2D synchronization signal, etc. We will use this information to identify the location of each group member, and propose a technology to manage the group using the information and a service that can be applied.

 For example, suppose a teacher (group representative, leader, etc.) is outing with students (group members other than teachers). If necessary, the leader in the group can be any member of the group and can be changed as needed, outdoor activities include indoor / outdoor activities, and group members can be active indoors and outdoors at any place. do. In this case, the teacher can always check the location of the students and can communicate in real-time two-way, and can notify the other party of the out of range warning when out of a certain range. This will be described in more detail with reference to the drawings below.

 Hereinafter, in the description of the present invention, although the detailed description is not mentioned with respect to the D2D discovery signal (ie, PSDCH) or the D2D direct communication data transmission method, the above-described transmission method (in particular, the method according to FIGS. 11 to 16) may be used. The same may apply.

In addition, in the present specification, the D2D ID (Identif ier) is an ID for distinguishing the D2D UE. The ID may identify a specific application of the terminal or may correspond to all of the temporarily assigned IDs valid only for a specified time.

 27 illustrates a user interface for implementing a method for managing a D2D terminal group according to an embodiment of the present invention.

 FIG. 27A illustrates a user interface (UI) of a group representative terminal (terminal A, for example, a teacher's terminal), and includes a plurality of terminals (eg, a group stored in a contact list of terminal A). For example, the steps of creating a group that can receive D2D service and the terminal of the high school students). FIG. 27 exemplifies a case where 1 group and 2 groups are stored in a contact of terminal A and 2 groups are selected.

 Also, in order to add a member to a D2D group, a person's name is searched for from a contact not stored as a group (B, C, D, E, F, etc. in FIG. 27) or stored in a contact of the A terminal from a user It is possible to create a group by directly inputting a phone number that is not present.

 As such, when creating a group in UE A, a D2D group may be generated in UE A itself without approval (or permission) from a member belonging to the group.

 In addition, on the contrary, when creating a group in terminal A, a group request message for requesting approval (or permission) may be transmitted to a member (for example, B, C, D, E, or F terminal) belonging to the group. . In addition, only the terminal that transmits the group response message in response to the group request message may be configured as a member of the D2D group generated by the terminal A.

When the generation of the D2D group is completed, the user's location in the terminal A as shown in FIG. The location 2702, 2705a, 2705b, and 27b5c of terminals belonging to the corresponding D2D group are displayed in real time and tracked. In addition, the distance from the terminal A may be displayed based on the position 2701 of the terminal A, not the positions 2702, 2705a, 2705b, and 2705c of the terminals belonging to the D2D group.

 Here, the location 2701 of the terminal A and the location (2702, 2705a, 2705b, 2705c) of the terminals belonging to the D2D group or the distance between the terminal A and the terminal belonging to the D2D group is derived by using the method described with reference to FIGS. 17 to 26. Can be. It may also be obtained using a Global Positioning System (GPS).

 Boundaries 2703 and 2704 indicating a certain range may be set based on the position of the A terminal, and a plurality of boundaries may be set according to the purpose. 27 illustrates a case where two boundaries are set.

Here, boundary 2 2704 is set as the maximum distance that can be covered (eg, lkm) using D2D technology, or a specific distance (eg, 600Π, etc.) determined by the user (eg, teacher) of terminal A. In addition, boundary 1 (2703) may be set as a boundary of a specific area that group members should not leave for the safety of group members or for other specific reasons, in this case boundary 1 (2703). Group members (i.e., B 2705a, G 2705b, and D 2705c) between the boundary 2 and the boundary 2 2704 are located outside the coverage desired by the terminal A (i.e., set). To a group member (ie, B (2705a), C (2705b), and D (2705c)) to the group members beyond the defined area as shown in Fig. 27 (b). A terminal You can send alerts automatically or manually.

 FIG. 27 (c) illustrates a UI / UX (User Experience) for UE B which receives a warning message or notification message using UE D2D technology when UE B is out of a certain range. For example, UE A sends a warning message or notification to UE B through 1 discovery message (ie, PSDCH) or PSSCH.

You can send (notif ication) messages.

 Also, the next action with a warning / notification message that is out of range.

You can also connect directly to the various services associated with the action. For example, a call is connected from terminal B to terminal A, a text message (eg, including location information of terminal B) is transmitted, or a directions service is provided from the position of terminal B to the position of terminal A. It may be. Here, the telephone / text to A terminal can be supported through D2D communication (for example, using PSSCH) or through a saller network. The pathfinding service may also support D2D communication (for example, using PSSCH) through a black cell network, and may support terminal B to go to a location where terminal A is located by using a map.

In FIG. 27, the outdoor scenario is a representative example, but a scenario in which indoor and outdoor activities are performed together, such as a shopping mall, may be considered. In this case, when the group representative terminal or the member terminals belonging to the group are located indoors, it is difficult to know the exact distance by GPS, and when the indoor LBS (Location Based Service) such as WLAN (Wireless Local Area Network) is used, the correct AP ( Access Point) There is a difficulty in securing the position in advance. In this case, the location measurement technology using the D2D discovery message described above with reference to FIGS. 17 to 26 can effectively secure the location information of the terminals in any indoor / outdoor situation based on the stability guaranteed by the cell teller technology.

 Referring to FIG. 28 below, what flow the related signal has in order to support the service of FIG. 27 will be described.

 FIG. 28 is a diagram illustrating a D2D UE group management method according to an embodiment of the present invention. FIG.

 Although not shown in FIG. 28, it is assumed that all group member terminals have previously formed a specific group as in the example of FIG. 27 based on a D2D ID or other membership service. In addition, it is assumed that all terminals broadcast D2D signals (eg, D2D discovery signals) periodically or aperiodically.

 First, let's look at case l (case 1). In case 1, it is assumed that terminal A is a group representative terminal.

 When a user of a specific terminal A of the corresponding group needs to know the location of group members while performing personal activities, the terminal A receives the user's input and executes the application (S2801).

The terminal A receives a discovery signal broadcast periodically or aperiodically from a group member terminal (eg, a smartphone, a wearable device) located in the D2D coverage (S2802). As described above, the D2D UE broadcasts the discovery signal periodically or aperiodically. Thus, in FIG. 28, for convenience of description, step S2802 is illustrated as being performed after step S2801, but regardless of execution of the application of terminal A (ie, regardless of step S2801), terminal A is discovered from the group member terminal. You will continue to receive the signal.

 In addition, regardless of generation of the group, the terminal A continuously receives the discovery signal from the surrounding D2D terminals. However, after generating the group, the discovery signal transmitted from the group member terminal can be identified based on the terminal identifier (ID) (or D2D ID) included in the discovery signal.

 In addition, although not shown in FIG. 28, UE A also broadcasts a discovery signal periodically or irregularly.

 In this case, the terminal A may calculate the distance between the terminal A and the group member terminal or the position of the group member terminal by using the method described with reference to FIGS. 17 to 26 based on the discovery signal received from the group member terminal.

 In addition, for convenient UX support, as shown in the example of FIG. 27 (b), the location of the group member terminals including the A terminal may be displayed on a map.

 As such, in order to indicate the location of the group member terminals on the map, the terminal A transmits a map transmission request message to the map server (S2803), and receives map information from the map server (S2804).

And, terminal A displays the map using the received map information, Map Display the position of the group member terminal on the screen (S2805)

 Here, the map server may correspond to a communication provider, or a black service provider. As a result, the terminal A displays the received map information, and can display the position of the group members or the distance between the terminal A and the group member terminal on the map.

 Meanwhile, the terminal A may store the map in advance. In this case, step A2803 and step S2804 may be omitted by the terminal A requesting and receiving map information from the map server.

 Next, we will look at case 2.

 UE A transmits and receives D2D data with one or more group member UEs.

5252, D2D direct communication with any one group member terminal may be performed.

(52807).

 As an example of D2D direct communication, 1: 1 communication (text, telephone, video call, etc.) or group communication (text, telephone, video call, etc.) with a plurality of group member terminals may correspond to this. Through this process, packets of data of these services are transmitted and received.

 Here, although not shown in FIG. 28, UE A is allocated with a resource for transmitting D2D data (ie, a PSSCH resource) to the base station according to the procedure of FIG. 16 in order to transmit D2D data to the group member UE. Using D2D communication with any one group member terminal can be performed.

In addition, UE A is requested to request resource allocation for D2D data transmission. A resource allocation procedure as shown in the example of FIG. 10 may be performed. However, since PSSCH resource allocation is requested rather than PUSCH resource, the PUCCH resource index distinguished from the SR for PUSCH resource request (that is, basic sequence for spreading the frequency domain of PRB and SR to which SR is transmitted). For example, a combination of a cyclic shift (CS) applied to a ZC time span) and an orthogonal code (OC) for time domain spreading of an SR may be used.

 Next, we will look at case 3. In case 3, it is assumed that terminal A is any one member terminal among a plurality of group members.

 Case 3 is a case in which the range warning message is received immediately before the range departure from the group representative terminal (eg, the group leader) when the terminal A is out of the designated range as shown in FIG. 27.

 As described above, UE A broadcasts the discovery signal periodically or aperiodically (S2808).

 Based on the discovery signal received from the group member terminal (including terminal A), the group representative terminal uses the method described above with reference to FIGS. 17 to 26 and the distance between itself and the group member terminal (including terminal A) or the group member terminal (A). Location of the terminal) can be calculated.

The group representative terminal uses D2D communication when the distance between itself and the group member terminal (including terminal A) is greater than a predetermined distance or when the position of the black group member terminal (including terminal A) is out of the predetermined coverage. Send a warning message (or notification message) (S2809). As described above in order to transmit D2D data to a group member UE (including UE A), the group representative UE is allocated with a resource (ie, a PSSCH resource) for transmitting D2D data to the base station according to the procedure of FIG. 16. The D2D communication with any one group member terminal may be performed using the resource. That is, the DSCH receives the D2D grant from the base station, allocates the PSSCH resource, and transmits a warning message through the PSSCH resource.

 When the terminal A receives the warning message (or the notification message) from the group representative terminal, it displays it on the screen (S2810).

 In addition, if the terminal A uses the map service to find the location of the group representative terminal, confirm its position, or return to within the predetermined coverage (S2811), it transmits a map transmission request message to the map server (S2811), and the map from the map server. Information can be received (S2812).

 The terminal A may display the position of the group representative terminal or the position of the terminal A on the received map, or display a path for guiding the position of the group representative terminal or the designated coverage.

In this case, UE A may calculate the distance between itself and the group representative terminal or the position of the group representative terminal using the method described with reference to FIGS. 17 to 26 based on the discovery signal broadcast from the group representative terminal. In addition, the group representative terminal may transmit its location or designated coverage information to the terminal A in step S2809. In the procedures of case 1 to case 3 described above, any one procedure may be performed independently or one or more procedures may be simultaneously performed. In addition, one or more procedures may be performed sequentially in time, regardless of order. On the other hand, assuming that a criterion for indicating the position of the group member terminal is moved, in this case, the coverage itself for the group member terminal continues to move. For example, the group representative terminal (for example, the teacher) is not always located somewhere in the middle, but moves with the group member terminal (for example, students). In this case, the same method as described above may be implemented based on the fixed D2D beacon device. 29 is a diagram illustrating a D2D user equipment group management method according to an embodiment of the present invention.

 Referring to FIG. 29, the D2D beacon devices 2910, 2920, and 2930 may be fixed in advance, and may provide the location of each D2D beacon device 2910, 2920, and 2930 to each D2D terminal in advance.

 Here, the D2D beacon device in the present specification means a device for transmitting a D2D signal periodically or aperiodically while having a fixed position.

For example, in the case of a famous tourist destination, the D2D beacon devices are fixed in various places to transmit information on each location to the D2D terminal, or an environment in which each D2D beacon device is installed in a street lamp may be expected. Based on the fixed D2D beacon apparatus (for example, D2D beacon 3 of FIG. 26) as a reference, group member terminals including the group representative terminal generate a group by registering the D2D ID.

 At this time, the D2D ID can be registered in two types. The type 1 D2D ID indicates a group representative terminal (eg, terminal A) 2901, and the rest indicates group member terminals 2902 other than the group representative terminal as the type 2 D2D ID. Here, the number of types may be two or more according to the use environment.

 Each terminal (ie, type 1 terminal and type 2 terminal) may display the positions of group member terminals (including the group representative terminal) on the screen centering on the D2D beacon device.

 At this time, since each terminal knows the location of the D2D beacon device in advance, its own location is obtained by using a mobile communication network or a known technique such as a global positioning system (GPS), and is a group member based on the D2D beacon device. The location of terminals (including group representative terminals) may be displayed on the screen.

 In addition, the distance from the D2D beacon device is calculated using the method described with reference to FIGS. 17 to 26 using the discovery signal broadcast from the D2D beacon device, and is a group member terminal (group representative terminal) based on the D2D beacon device. Location) can be displayed on the screen.

Boundaries 2903 and 2904 indicating a certain range may be set based on the position of the fixed D2D beacon device, and a plurality of boundaries may be set according to the purpose. 29 illustrates a case where two boundaries are set. Here, boundary 2 2904 is set to the maximum distance that can be covered (eg, lkm) using D2D technology or a specific distance (eg, 600m) determined by the user (eg, teacher) of the Type 1 terminal. ), Etc. can be set. In addition, boundary 1 2903 may be set as a boundary of a specific area that group members should not leave for the safety of group members or for other specific reasons. In this case, the group member (ie, B 2905) between boundary 1 2903 and boundary 2 2904 is outside the desired (ie set) coverage of the type 1 terminal (warning message). Means a transitional zone).

 A flow of related signals for supporting the service of FIG. 29 will be described with reference to FIGS. 30 and 31 below.

 30 is a diagram illustrating a D2D UE group management method according to an embodiment of the present invention.

 Referring to FIG. 30, the D2D beacon apparatus broadcasts a discovery signal periodically or aperiodically (S3001).

A terminal having a D2D ID of type 1 (terminal A) and a terminal having a D2D ID of type 2 (terminal B) calculate a distance from the D2D beacon apparatus based on a discovery signal broadcast from the D2D beacon apparatus ( S3001, S3003). That is, each terminal calculates a distance from the D2D beacon apparatus using the method described above with reference to FIGS. 17 to 26. In addition, as described above, since each terminal knows the location of the D2D beacon device in advance, it is possible to use its own location using the mobile communication network or It is also possible to obtain using a known technique such as Positioning System) and to calculate the distance to the D2D beacon device.

 If the terminal B detects that it has moved out of a specific area (boundary 1 (2903) of FIG. 29) while calculating a distance from the D2D beacon device (ie, immediately before or immediately after leaving coverage) ( S3004), the terminal B warns the terminal B user by displaying a warning message / notification by itself (S3005).

 In addition, the fact that the terminal B is out of range, that is, the information of the terminal B can be transmitted to the terminal A through the D2D data channel (S3006). Here, the information of the terminal B may include an identifier of the terminal B and indication information for indicating that the coverage is out of coverage.

Here, although not shown in FIG. 30, the terminal B is allocated a D2D data channel resource (ie, a PSSCH resource) to the base station and transmits the allocated D2D data channel resource to the terminal A to transmit information of the terminal B through the D2D channel. D2D data (that is, information of UE B) can be transmitted to UE A. In addition, the terminal B may perform a D2D direct communication, and perform text, telephone, video call with the terminal A. In addition, although not shown in FIG. 30, additionally, if the terminal B uses the map service to find the location of the group representative terminal (that is, the terminal A), check its own position, or return to the predetermined coverage, the Map server Sends a map request message to the server and receives map information from the map server. The terminal B displays the position of the group representative terminal or the position of the terminal B on the received map. Alternatively, the path for guiding the location or the designated coverage of the group representative terminal can be displayed.

 31 is a diagram illustrating a D2D UE group management method according to an embodiment of the present invention. Referring to FIG. 31, a terminal having a D2D ID of type 1 (terminal A) and a terminal having a D2D ID of type 2 (terminal B) broadcast a discovery signal periodically or aperiodically (S3101, S3102).

 The D2D beacon apparatus calculates a distance from each terminal based on a discovery signal broadcast from terminal A and terminal B (S3103). That is, each D2D beacon device calculates the distance to each terminal using the method described above with reference to FIGS. 17 to 26. Subsequently, while calculating the distance from the D2D beacon apparatus, if the terminal B detects that it has left the range of the specific area (Boundary 1 2903 of FIG. 29) (that is, immediately before or after leaving the coverage) (S3104) In step S3105, the D2D beacon apparatus informs UE A of the UE B through the D2D data channel (ie, PSSCH). Here, the information of the terminal B may include an identifier of the terminal B and indication information for notifying that the coverage is out of coverage.

In addition, the D2D beacon apparatus also transmits a warning message (or a notification message) for notifying the terminal B of coverage through the D2D data channel (ie, PSSCH) (S3106). Here, although not shown in Figure 31, the D2D beacon device is A terminal and B stage D2D data channel resources (i.e., PSSCH resources) are allocated to the base station in order to transmit information and warning messages of UE B through the D2D channel, and the D2D data is transmitted to UE A using the allocated D2D data channel resources. (Ie, information of UE B), and D2D data (ie, warning message) can be transmitted to UE B. On the other hand, if a group member terminal deviates from a predetermined coverage during group activity, the group member terminal deviating from the coverage is used to communicate with another group member terminal or maintain the terminal group by using a path in a communication protocol. Describe the method.

 Here, the predetermined coverage is set to the maximum distance that can be covered (eg, lkm) using D2D technology or a specific distance (eg, 600m) determined by the user (eg, teacher) of the group representative terminal. Can be set. In addition, it may be set as a boundary of a specific area in which group members should not leave for the safety of group members or for other specific reasons.

 32 is a diagram illustrating a D2D group management method according to an embodiment of the present invention.

In FIG. 32, it is assumed that one D2D group is generated and the group members are UE1 to UE5. However, it is assumed that UE1 is removed from the group due to voluntary movement of UEs and is in a situation where D2D connection is not possible even with the closest UE2 among the group members. In this case, UE1 attempts to connect to the salarer network when the RRC is in an idle state as a method for maintaining connection with the group members UE 2 to UE 5 and connects the RRC with one of the group member terminals. Establish a connection.

 In FIG. 32, since only UE3 is in an RRC connected mode, UE3 may be an anchor UE for communicating between UE4 and a group. However, if there are other member UEs in the RRC connected state other than UE3 among the group member UEs, the anchor UE may select using appropriate criteria.

 For example, in consideration of the distribution status of the group members, the UE capable of forming both individual connections with the group members or the UE capable of making the most connections may be selected as the anchor UE. This is not an actual 1: 1 connection, but rather a parameter that must be considered in advance when attempting to establish a 1: 1 connection (for example, Reference Signal Received Power (RSRP), Signal to Noise Ratio (SNR), SINR (Signal to Interference plus Noise Ratio) can be used as a criterion for anchor UE selection. For example, each group member terminal periodically transmits a parameter for a discovery signal received from a group member terminal other than itself to the base station (black is voluntary (terminal trigger)) or aperiodically (or non-voluntary (base station trigger)). Can be sent). The base station may select the anchor UE based on the parameters received from each group member terminal.

Alternatively, UE1 sends a sync signal when UE1 wants to connect with the group. anchor may be selected as a UE. This is done by making the RRC connected to eNB7> the corresponding UE and establishing a connection with UE1. That is, the base station may select a terminal (ie, a D2D synchronization source or a link synchronization source) that periodically transmits a D2D synchronization signal among the corresponding group member terminals as an anchor UE.

 Or, if there is a cluster head managing the group (for example, a UE that plays a role of sending a beacon, broadcasting important information, etc.), designate the cluster head as a group management anchor UE. Can be. For example, the base station may select a terminal that periodically transmits the PSBCH among the group member terminals as the anchor UE.

In this process, when UE1 establishes an RRC connect ion among group member terminals and attempts to communicate by selecting a target UE, the UE1 should be interpreted as attempting to connect ion to the group to which the target UE belongs. And, it means that a group anchor UE may be connected rather than a destination UE (ie, a target UE) in the process. That is, UE1 attempts to connect a cell to UE2, but the eNB may make a connection to UE3 by interpreting the request. The connection here may be in a different procedure and state than the 1: 1 socket RRC connection. That is, since UE1 is intended to communicate with UE2, U3, UE4, and UE5, even though UE1 requests communication with UE2, eNB establishes communication path with UE3 and UE3 and UE2 communicate with each other through D2D communication. to be. That is, the anchor UE is to perform the role of the terminal to relay the communication. If UE1 out of coverage needs to perform group communication with the group, In case of communication, both UE2 and UE5 should be in an RRC connection state, and then group communication is performed. In this case, D2D group communication is virtually meaningless. Therefore, if it is meaningful to D2D group communication and still consider performing D2D communication, it is preferable that only one terminal in the group makes a cell connection. This will be described in more detail with reference to the drawings below. 33 is a diagram illustrating a D2D UE group management method according to an embodiment of the present invention.

 In FIG. 33, it is assumed that a target UE (that is, a target UE) that UE2 wants to communicate with via an RRC connection is UE3, and that the base station knows a D2D UE group in advance.

 In addition, it is assumed that UE1 is selected as an anchor UE by the method described above. In this case, the anchor UE may be selected by a base station or a rule shared between the base station and a group member terminal.

 Referring to FIG. 33, UE 2 (UE2) base station sends a group communication link setup request message including an identifier for UE 3 (ie, UE3) to establish group communication with RRC connection. (S3302).

In this case, when the UE 2 is in the RRC_IDLE state, the UE transitions to the RRC—CONNECTED state according to the procedures of FIGS. 8 and 9 (S3301), and sends a group communication link setup request message to the base station. send Can be done (S3302).

 As described above, since UE1 (UE1) is an anchor UE, the base station transmits a group communication link setup message to UE1 (S3303).

 Terminal 1 transmits a group communication link setup response message to the base station in response to the D2D link setup message (S3305).

 In this case, when the UE 1 is in the RRC—IDLE state, the UE 1 transitions to the RRC—CONNECTED state according to the procedures of FIGS. 8 and 9 (S3304), and sends a group communication link setup response message. To the base station] (S3305).

 The terminal 2 establishes a group communication link with the terminal 1 through the base station (ie, connects a cell).

 Thereafter, the terminal 2 performs group communication with one or more group member terminals through the terminal 1. In other words, when the terminal 2 transmits data to the group 1 through the group communication link (that is, the cellular connection) in order to transmit the data to one or more group member terminal, the terminal 1 is connected via the D2D direct communication, The terminal transmits data of the terminal 2 to one or more group member terminals through the PSSCH. It is also possible to reverse this.

34 is a diagram illustrating a D2D group management method according to an embodiment of the present invention. In FIG. 34, the coverage of the UE existing in the center of the group A is deviated, but the coverage of the UE2 near the group edge, especially UE1, is not deviated.

 In this case, group A operates normally. Instead, UE2 continues to relay the packets of group A so that UE1 can act as a member of group A in order to assign UE1 to a member of group A. That is, a D2D direct communication link is established between UE1 and UE2, a D2D direct communication link is established with UE2 and a group member (UE3, UE4, UE5), and UE2 is configured with UE1 and one or more group members (UE3, UE4, UE5). Relays data between ᅳ

 In this case, it is not necessary to maintain additional satellite connections as shown in FIGS. 32 and 33. In case of non-seller coverage, the effect of extending the coverage of group A may be obtained. In such group management, it is also possible to provide technical or monetary compensation to the corresponding relay UE. Proximity-based notification method

The present invention proposes a method for solving a technical problem required to implement a proximity-based notification service based on a terminal-to-terminal communication or a beacon-to-terminal direct communication technology. Direct communication between terminals can be realized using the methods of LTE D2D, LA, Blue tooth. Hereinafter, in order to clarify the description of the present invention, the D2D is mainly described, but the technical features of the present invention are limited thereto. Is not.

 LTE D2D is expected to have the following technical features.

 Long Range (service coverage)

High Mobility (velocity)

 Large Scalability (discovered / communication users)

 Low Battery Consumption (synchronized operation)

 High Reliability / Robustness (LTE technology based)

-Low delay t (Small Delay (elapsed time for discovering))

 High-level Security (privacy)

Low Latency (direct data delivery)

 Connectionless communication (no radio link setup)

 -Pure interworking of Cellular and D2D by one LTE technology

Implemented within a single UE modem chip One of LTE features in Rel-12 and later releases

 Improved multi-hop synchronization and relaying

 Evolved to Mesh Network Hereinafter, a proximity-based notification method according to the present invention will be described.

 Proximity-based notification method according to the present invention is, for example, before the appointment time (for example, one hour before) after the meeting participants in advance to detect each other's D2D ID (D1D) If an ID is detected, a notification can be given. Subsequent subsequent operations provide a call, message, map, and so on. A service provided by applying the present invention may be referred to as a bump into 'service. In the following description, it is referred to as a notification service.

 In the present specification, a D2D ID (ID) may be an ID for identifying a D2D terminal, an ID for identifying a specific application of a terminal, or may correspond to all of a temporary assigned ID valid only for a specified time.

Hereinafter, in the description of the present invention, although the detailed description is not mentioned with respect to the D2D discovery signal (ie, PSDCH) or D2D direct communication data transmission method, the above-described transmission method (in particular, the method according to FIGS. 11 to 16) is The same can be applied. 35 is a diagram illustrating a user interface (UI) for implementing a proximity-based notification method according to an embodiment of the present invention.

 FIG. 35 exemplifies a process in which terminal A (that is, host terminal of a meeting) is assigned a D2D ID of attendees using a schedule function (for example, a calendar application).

 When the terminal A executes the calendar application, the schedule function may additionally support the attendee field 3501 and the notification field 3502 so that the terminal A user can easily use the notification service.

 An attendee field 3501 is a field for adding an attendee (or an attendee terminal) to which a proximity-based notification method is applied. Terminal A, attendees (terminal B, terminal C, terminal D) may be selected from the address book. For example, it may be selected as a participant's phone number, email address, or the like.

 The notification field 3502 is a field for setting a time of notification and a method of notification informing the proximity of an attendee terminal.

In other words, the notification field 3502 sets the terminal control to transmit a discovery signal delivering the D2D process D from the terminal A from a short time before the scheduled time (for example, 1 hour, 30 minutes, 10 minutes, etc.). This field is used to set the value of whether or not the controller (on) is automatically turned on. In addition, it is a field for setting a notification method (eg, vibration and / or ringtone, or whether a notification message is displayed on the screen) when the participant terminal is close. When the setting of the schedule function is completed in the terminal A (for example, receiving a save button input from the user), at the same time, a process of checking whether the D2D ID can be shared with the terminal included in the attendee list is started. do. That is, as soon as the setting of the schedule function for the terminal A controller is completed, a message for inquiring a participation intention is automatically transmitted to each participant terminal. For example, a text message is sent to each participant terminal through a short message service (SMS) or other messenger application to inquire whether the user agrees to use the notification service.

 Hereinafter, a proximity-based notification method will be described in more detail with reference to the accompanying drawings. In the following drawings, for convenience of explanation, it is assumed that one participant is described, but the present invention is not limited thereto, and the number of participant terminals is not limited.

 36 is a diagram illustrating a proximity-based notification method according to an embodiment of the present invention.

 Proximity-based notification methods can be largely divided into three stages: scheduling, assigning a D2D ID, displaying a proximity notification message, and returning the allocated D2D ID.

First, referring to step 1, the terminal A (ie, the host terminal) sets up a schedule function (eg, a calendar application) as shown in FIG. 35 (S3601). As described above, the schedule function setting includes generating a participant terminal list participating in the notification service and setting a notification method when the participant terminal detects proximity. The schedule function setting may further include setting a schedule time and schedule place information. The controller of the terminal A transmits a usage agreement request message of the notification service to the terminal B (ie, the participant terminal) (S3602).

 The terminal B receiving the use agreement request message of the notification service from the terminal A may reject or reject the request of the terminal A. For example, as described above, the use agreement request message of the notification service from the terminal A may be transmitted as a message of an SMS or a messenger application. And, the terminal B displays the consent / rejection window with the message sent from the terminal A, the consent / rejection is determined according to the selection input of the terminal B user.

 At this time, if the user of the terminal B rejects any further process does not proceed. In this case, although not illustrated in FIG. 3 6, the terminal B may transmit a response message indicating the rejection to the terminal A in response to the request for consent of the notification service.

 In FIG. 3 6, it is assumed that the terminal B agrees (that is, the consent button is input from the terminal B user).

 When the terminal B agrees to the request of the terminal A (S 3 603), the terminal A and the terminal B through step A is the D2D ID management server, each of its own D2D ID or black (i.e., terminal A and B) D2D ID) (S3604). That is, the D2D ID management server delivers each other's D2D IDs to UE A and UE B through a predetermined procedure so that each other knows the other's D2D ID.

Here, the D2D ID management server may be a base station or a network node (eg, MME, M2M server, etc.).

 Hereinafter, step A will be described in more detail with reference to the accompanying drawings. In this case, step A may be divided into the procedure of FIG. 37 or FIG. 38 according to what information is transmitted when the organizer terminal transmits a request for consent to use the notification service to the participant terminal. 37 is a diagram illustrating a proximity based notification method according to an embodiment of the present invention.

 Referring to FIG. 37, the terminal A (that is, the host terminal) sets a notification function as in the example of FIG. 35 (S3701). That is, a list of participant terminals participating in the notification service is generated, and a notification method is set when the participant terminal detects proximity.

 The controller of the terminal A transmits a usage agreement request message of the notification service to the terminal B (ie, the participant terminal) (S3702).

 The terminal A may transmit the terminal A specific information field to the terminal B including the usage agreement request message of the notification service. For example, a proximity-based service application ID (ProSe App ID: Proximity-based Services Application ID) of UE A may be included and transmitted.

 The ProSe App ID used by the service layer (or application layer) is a human readable character, a service type, store information, etc., and a value that does not change, such as an email address. Become.

In addition, the use agreement request message of the notification service is scheduled time, schedule location settings It may further comprise a beam.

 When the terminal B agrees to the request of the terminal A (S3703), the terminal B transmits a D2D ID sharing request message to the D2D ID management server (S3704).

 At this time, UE B transmits the ProSe App ID of UE A and UE B in the D2D ID sharing request message.

 The D2D ID sharing request message means a message for requesting D2D ID allocation to the D2D ID management server.

 On the other hand, although not shown in FIG. 37, when the terminal B rejects the request of the terminal A, the terminal B may transmit a response message indicating the rejection to the terminal A in response to the use agreement request message of the notification service. .

 The D2D ID management server transmits the D2D ID to both the A terminal and the B terminal in response to the D2D ID sharing request message (S3705). That is, the D2D ID management server allocates a D2D ID to each of terminal A and terminal B, and transmits all of the D2D IDs assigned to terminal A and terminal B to terminal A and terminal B, respectively.

 The D2D ID is included in the D2D discovery signal broadcasted periodically or aperiodically by UE A and / or UE B and transmitted.

When the controllers of UE A and UE B receive the D2D ID from the D2D management server, they automatically display a notification service preparation notification ( rea dy notification) to each user (S3706, S3707).

38 illustrates a proximity based notification method according to an embodiment of the present invention. Cotton.

 Referring to FIG. 38, the terminal A (that is, the host terminal) sets a notification function as in the example of FIG. 35 (S3801). That is, a list of participant terminals participating in the notification service is generated, and a notification method is set when the participant terminal detects proximity.

 The controller of the terminal A transmits a usage agreement request message of the notification service to the terminal B (ie, the participant terminal) (S3802).

 Here, the use agreement request message of the notification service may include schedule time and schedule place information.

 When the terminal B agrees to the request of the terminal A (S3803), the terminal B transmits a response message indicating the consent to the terminal A as a response to the use agreement request message of the notification service (S3804).

 On the other hand, although not shown in FIG. 38, when the terminal B rejects the request of the terminal A, the terminal B may transmit a response message indicating the rejection to the terminal A in response to the use agreement request message of the notification service. .

 Terminal A and terminal B transmit a D2D ID sharing request message to the D2D ID management server (S3805 and S3807).

Here, UE A may include the UE A specific information field (for example, the Prose App ID of UE A) in the D2D ID sharing request message and transmit the UE. For example, it may be transmitted by including the Prose App ID of the B terminal. The D2D ID management server transmits the D2D ID assigned to the terminal A to the terminal A in response to the D2D ID sharing request message received from the terminal A (S3808). In addition, the D2D ID management server transmits the D2D ID assigned to the terminal B to the terminal B in response to the D2D ID sharing request message received from the terminal B (S3806).

 That is, terminal A receives the D2D ID of terminal A and terminal B receives the D2D ID of terminal B from the D2D ID management server.

 Subsequently, the controllers of the terminal agreeing to the notification service share each other's D2D IDs (S3809). That is, terminal A transmits the D2D ID of terminal A to terminal B, and terminal B transmits the D2D ID of terminal B to terminal A.

 When the sharing of the D2D ID is completed, the controllers of the terminal A and the terminal B automatically display the ready notification service (ready notification) to each user (S3810, S3811).

 In the first step described above, the D2D ID management server may be implemented in various ways, and basically, a method of matching a specific information field and a D2D ID may vary according to the nature of the server administrator. This will be described with reference to the drawings below.

 FIG. 39 is a diagram for describing a method of matching a specific information field and a D2D ID according to an embodiment of the present invention.

Referring to FIG. 39, a service provider may use a specific information field for matching with a D2D ID based on a phone number. In the case of a telephone number, the telephone number is transferred to a D2D ID server operated by a telecommunication company to be assigned a D2D ID.

 In addition, in the case of a chip manufacturer, a unique ID of a chip mounted on a terminal may use a specific information field for matching with a D2D ID.

 In addition, other applications and service providers may use the user's e-mail or website or application's login account information with a specific information field to match the D2D ID. .

 Referring back to FIG. 36, the second step will be described in detail.

 After a while, if the set date of the schedule function has arrived in step S3601, both the organizer and the participant will start toward the appointment location.

 In this case, the D2D discovery signal may be broadcast (ie, broadcast D2D ID) or not depending on the user's settings of the terminal A and the terminal B or the application running.

 In FIG. 36, it is assumed that a function related to discovery signal transmission is turned off (of f) in both A terminal and B terminal.

 In addition, in FIG. 36, it is assumed that an alarm is set at an hour before the scheduled time in the terminal A (that is, the host terminal) as in the example of FIG. 35.

As such, since the terminal A has been set an alarm 1 hour before the scheduled time, The controller of the terminal A starts transmitting the discovery signal before the terminal B (S3605)-FIG. 36 omits the step in which the terminal A broadcasts the discovery signal (ie, D2D ID broadcasting) for convenience of description. It was.

 Thereafter, the terminal B initiates transmission of the discovery signal by the controller of the terminal B (S3606). Here, the start time of the discovery signal of the terminal B may be automatically set, in which case it may be set in advance to a predetermined time from a schedule time or a schedule time. Alternatively, transmission of the discovery signal may be started from a time point set by the user of terminal B.

 When the terminal A receives the discovery signal from the terminal B, the terminal A detects the proximity of the terminal B based on the D2D ID in the discovery signal (S3607), and displays a notification indicating that the terminal B is in close proximity to the user. (S3608).

 In addition, when UE B receives a discovery signal from UE A, it detects that UE A is close based on the D2D ID in the discovery signal, and notifies the user by displaying a notification that UE A is close on the screen (S3609). .

 In this case, since receiving the D2D discovery signal means that the distance between the terminals is within the coverage of the discovery signal, each terminal has a coverage (eg, about lkm) between the other terminals transmitting the discovery signal. You can check it.

In addition, each terminal is based on the discovery signal received from the other terminal, the distance between itself and the other terminal using the method described in FIGS. Alternatively, the location of the counterpart terminal may be calculated. In addition, when the other terminal is closer than the distance preset by the user (or set by default) in terminal A and / or terminal B, a notification message indicating that the other terminal is close may be displayed on the screen. In this way, when participants are close to the meeting place, the participants are naturally located in close proximity to each other, so that each other detects that the other party is close and displays a notification message.

 Hereinafter, a user use case for a notification service to which the present invention is applied will be described.

 40 is a diagram illustrating a user interface for implementing a proximity-based notification method according to an embodiment of the present invention.

 Referring to FIG. 40, as shown in FIG. 40 (a), when UE A detects that UE B has approached a predetermined distance (within a discovery signal coverage, a predetermined distance), UE A (that is, controller) is UE B. A notification message is displayed on the screen. Here, a call connection button 4001, a message transmission button 4002, and a confirmation button 4003 may be displayed together in the notification message window.

 When the call connection button 4001 is selected by the user, the terminal A attempts to connect to the terminal B.

When the message transmission burner 4002 is selected by the user, the terminal A switches to the message transmission screen (that is, the message window with the terminal B) as shown in FIG. 40 (b) and receives a message from the user. When the confirmation button 4003 is selected by the user, the terminal A recognizes that the user has confirmed the notification message, and closes the notification message window.

 41 is a diagram illustrating a user interface for implementing a proximity-based notification method according to an embodiment of the present invention.

 FIG. 41 (a) illustrates that when terminal A (organizer terminal) detects that terminals B and C, which are participants of a meeting, are approached within a predetermined distance (in a discovery signal coverage, a predetermined distance), terminal A (that is, a controller) Displays a notification message that the terminal B, terminal C is close.

 Here, the location message 4101 and the confirmation burn 4102 may be displayed together in the notification message window.

 When the location button 4101 is selected by the user, the terminal A switches the map screen as shown in FIG. 40 (b) to display the positions of the terminal B 4103 and the terminal C 4104 on the map. To try.

 One way to identify your location is by using GPS. In addition, LTE / LTE-A positioning technology can be used. That is, a technique of confirming the position of the terminal may be utilized by receiving a positioning reference signal (PRS) transmitted by a neighboring base station and analyzing the arrival time difference of the received signal.

Using this method, UE B and UE C can measure their own location and transmit their own location information to terminal A through the D2D data channel. In this case, the B / C terminal is allocated a D2D data channel resource (ie, PSSCH resource) to the base station to transmit its location information to the A terminal through the D2D data channel, and then uses the allocated D2D data channel resource to the A terminal. D2D data (ie its own location information) can be transmitted.

 In addition, the terminal A may calculate the distance between the terminal A and the B / C terminal or the location of the B / C terminal using the method described with reference to FIGS. 17 to 26 based on the discovery signal received from the B / C terminal.

 On the other hand, when the confirmation button 4102 is selected by the user, the terminal A recognizes that the user has confirmed the notification message, and closes the notification message window.

 42 is a diagram illustrating a user interface for implementing a proximity-based notification method according to an embodiment of the present invention.

 42 shows a case in which all except the terminal B are already gathered at an appointment place. When terminal B is approaching a neighboring location, all of the gathered participant terminals receive the discovery signal transmitted from terminal B and sense that the terminal B is near, and the participants terminal (that is, ) All display a notification message for notifying that the terminal B is in proximity. 42 (a) illustrates a screen of terminal A (host terminal). As shown in the example of FIG. 40, a call connection button 4201, a message transmission button 4202, and a confirmation button 4203 may be displayed together in the notification message window.

When the call connection button 4201 is selected by the user, the terminal A attempts to connect to the terminal B. When the message transmission button 4202 is selected by the user, the terminal A switches to the message transmission screen (that is, the message window with the terminal B) as shown in FIG. 42 (b) and receives a message from the user.

 When the confirmation button 4203 is selected by the user, the terminal A recognizes that the user has confirmed the notification message, and closes the notification message window.

 Referring back to FIG. 36, the three steps will be described in detail.

 When the schedule time is over in the schedule function set in step S3601, each terminal (controller of terminal A and terminal B) automatically sends a D2D ID return request message to the D2D ID management server, from which time the D2D ID transmits another user. To be released (S3611).

 At the same time, each terminal (controller of terminal A and terminal B) stops transmitting a discovery signal (that is, broadcasting D2D ID of each terminal).

At this time, the controller may perform the above two actions (ie, returning the D2D ID and stopping the discovery message transmission) based on the schedule time set in the schedule function as described above. A field for stopping the discovery signal transmission (ie, notification service off) may be added to the. In this case, the terminal A may set the criterion of stopping the discovery signal transmission as a distance or time. For example, when all participant terminals reach within a preset distance (for example, 5 m) based on terminal A (organizer terminal), the discovery signal is stopped or a preset time (for example, 5 from the schedule time) is reached. Minutes), the discovery signal You can stop.

 In addition, even if these fields are not added separately, all the participant terminals reach within a predetermined distance (for example, 5 m) based on terminal A (organizer terminal), or a preset time (for example, 5 minutes) from the schedule time. This discovery may automatically stop the discovery signal.

 As such, according to the proximity-based notification method of the present invention, anyone with a D2D device has an advantage in that a service can be provided without a service platform built in advance. In addition, it is possible to easily use the notification service using the D2D discovery signal by adding only a related field to a calendar application familiar to existing users. Meanwhile, another embodiment of a proximity-based notification method according to the present invention will be described. In the proximity-based notification method according to the present invention, a terminal searches for an associated service (a shopping mall, an article, etc.) using a specific algorithm on information stored or viewed in a terminal through a specific function, and performs a specific operation when the terminal satisfies a specific condition. Suggest ways to do this. For example, when the word A is input from the user, the terminal maps / extracts the service B associated with the word A and performs an association operation when the terminal satisfies a certain condition at an arbitrary position (for example, providing an associated service). It is.

The above-mentioned "algorithms" perform specific functions (hardware) or functions / roles that map extracted words inputted from the user into associative words / associated services. Generic term refers to software or entities represented by a combination of both. Hereinafter, for convenience of description, it may be referred to as an 's-engine (S-engine: Serendipity Engine)' or 'S-agent (Smart agent)'.

 For example, when the above algorithm is implemented in a processor, a mapping operation may be performed in the processor of the terminal. In addition, when the above algorithm is implemented as separate hardware modules, a mapping operation may be performed by the corresponding modules. In addition, when the above algorithm is implemented in software, the algorithm code is stored in the memory, the processor may perform a mapping operation with reference to the code stored in the memory.

 In order to recommend a specific service (i.e., related service) to the user, user-related information is required, and examples of how this information can be collected include: letters and numbers, voice language, and scanning documents that are directly input from the user. This includes any form of information that has been entered into drawings, applications (calendar, memos, alarms, Internet applications, etc.) or downloaded or downloaded from external devices (e.g., web site servers). . In the following, although not explicitly mentioned in the present text, the associated word engine can be regarded as valid input if it can extract and / or process meaningful information from any type of input. Furthermore, the sensing information measured or received through the sensor of the terminal, such as stratification, temperature, biometric information, smell, etc., may be used as an input value of the associated word engine.

For example, when receiving a character from the user, the terminal content of the character We suggest the service to the user by mapping the word associated with the meaning of the letter, mapping the word with the recommendation service.

 In addition, in the case of SMS text or the Internet, the terminal extracts a word clicked or selected by the user and processes it to propose a user-customized service. That is, the user can manually select the desired information while using text or the Internet. Hereinafter, for convenience of description, a function of manually selecting and extracting a specific word or sentence may be referred to as a (smart) link function.

 43 illustrates a user interface for receiving information from a user according to an embodiment of the present invention.

 In FIG. 43, for the convenience of description, the information transmitted to the associated word engine is illustrated as an example of text input from a user.

 In the case of a calendar, alarm and memo application, the stored information may be automatically transmitted to the associated word engine as soon as the user stores the information.

 In the case of a calendar application, as shown in FIG. 43 (a), a location inputted from a user and a related word Serendipity 4301 are transmitted to the associated word engine. In the case of the alarm application, as shown in (b) of FIG. 43, an associated word 4302 input from the user is transmitted to the associated word engine.

 In the memo application, as shown in FIG. 43 (c), the entire content 4303 written in the memo input from the user may be transmitted to the associated word engine.

Although not illustrated in FIG. 43, other text-based storage The various functions (or applications) of a word are also conveyed to the associated word engine, either Serendipity or the entire content.

 In addition, in the case of a calendar application and an alarm application, like the memo application, the entire memo input from the user is transmitted to the associated word engine, and the associated word engine may perform information processing by itself. For example, the association word engine may divide a sentence into predetermined units (eg, morphemes, words), extract meaningful units, and perform association word / associated service word mapping for each unit.

 Before the information input from the user is transmitted to the associated word engine, the user may confirm in advance whether the associated word engine mappable information.

 For example, in the calendar application and the alarm application, icons (4301a, 4302a) in the form of buttons are displayed next to the related word (Serendipity), and when the entire contents are delivered to the related word engine, such as a memo application, a separate screen is displayed. In the space of the button 4303a is displayed.

 If the information input from the user is information that can be mapped by the associated word engine, when the associated word input buttons (4301a, 4302a, 4303a) are input from the user, the terminal associates the associated word / associated service with the information input from the user. Is displayed in a separate screen or pop-up format.

If the information input from the user is information that cannot be mapped by the associated word engine, the terminal manually connects the associated word / associated service word as shown in FIG. 43 (d). Displays the screen.

 In FIG. 43 (d), for convenience of explanation, it is assumed that a word that can be mapped to an associated word / associated service word is “aspirin”.

 When the user inputs the word "aspirin" and then presses the associated word input buttons 4301a, 4302a, and 4303a, the user is directed to a screen for selecting a service name corresponding to "aspirin" as shown in FIG. 43 (d). Since aspirin is a type of drug, it is assumed that the user selects a service name of “pharmacy” in Fig. 43 (d). The service is connected and recorded (delivered) in the associated word engine, after which the aspirin is input from the user and the associated word engine can map "aspirin" to "pharmacy".

 If the user inputs more than one word, the user performs segmentation based on the blank character so as to perform operations as shown in FIG. 43 (d). For example, in case of input such as "Aspirin Eating", a screen similar to FIG. 43 (d) may be displayed for "Aspirin" and "Eating", respectively.

 44 is a diagram illustrating a user interface for receiving information from a user using a link function according to an embodiment of the present invention.

 43 (a) illustrates a process in which information input by a user is extracted by a link function and delivered to an associated word engine.

For example, when a user long presses (or touches) a message to select a link function, a link selection window 4401 may be displayed on the screen. Link selection window (4401) is the association word Engine input button 4401a. When the user selects the associated word engine input button 4401a, the terminal displays the word associated with the action in the text message, that is, the word “cold medicine”. Is passed on.

 43 (b) illustrates the internal operation of the associated word engine.

 The association word engine basically stores a table that maps association services with service IDs. Hereinafter, in the present specification, for convenience of description, this is referred to as an association service table.

 Here, the service ID means an identifier for identifying a specific store (or a D2D terminal / device installed in the store). The service ID may be the same identifier as the D2D ID, but may be a different identifier.

 45 is a diagram illustrating an association service table according to an embodiment of the present invention.

 Referring to FIG. 45, an association service table is composed of an association word and a corresponding service identifier (ID).

 45 corresponds to an example of the association service table. That is, the present invention is not limited thereto, and configuration items of the association service table may be partially changed as necessary.

The associated service table is multilingual and can be compared based on the language entered by the user. In addition, the user can access the related service table through a separate UI screen. It may be manually updated or updated by receiving signals from nearby LTE D2D devices, or may be updated collectively by receiving data from a service ID management server.

 Hereinafter, for convenience, a description of a process of mapping a user input to an associated word will be described using Korean as an example with reference to FIG. 45.

 Referring to FIGS. 44 and 45, the associated word engine that receives the word “cold medicine” in FIG. 44 (a) searches for an associated word in the related service table to search for the same word as “cold medicine ,,. .

 As shown in the example of Fig. 45, the associated service table does not have an associated word of “cold medicine.” As such, when there is no associated word that matches one word, the associated word engine combines two or more words. In the above example, the word "cold" and the word "about" can be combined to form a "cold medicine".

The service ID (0x001123) corresponding to “or“ about ”'is mapped.

 The service ID mapped with the association word is added to the list for monitoring the D2D discovery signal along with link information accessible to the application from which the word is extracted. For convenience of description, this is referred to as a D2D discovery signal monitoring list. 46 is a diagram illustrating a D2D discovery signal monitoring list according to an embodiment of the present invention.

The D2D discovery signal monitoring list (or the D2D signal monitoring list) may be configured as shown in FIG. 46, and link information for searching for a function (or a user program or an application) that receives information from a mapped service ID and a user. (In other words, Associated links) are stored. In other words, when the information is extracted from the SMS message through the link function, Message ID: 5 is stored as the related link, and when the user receives information from the calendar application, Calendar ID: 8 is stored as the related link.

 The D2D discovery signal monitoring list configuration item may be partially changed as necessary. The D2D discovery signal monitoring list may be stored without limitation within the range allowed by the terminal memory. ·

 Referring back to FIG. 44, the association word "cold medicine" may be mapped to the association store "pharmacy" by the association word engine of the terminal according to the above-described scheme. That is, the association word "cold weakness" is mapped to a service ID corresponding to "pharmacy", and the terminal generates a D2D discovery signal monitoring list including the corresponding service ID and link information.

 44 (c) illustrates a terminal screen that a user can see when a pharmacy exists in a neighboring mall.

 If there is an LTE D2D device that broadcasts a discovery signal in the vicinity while moving, the user terminal continuously receives the D2D discovery signal. If the received D2D discovery signal matches the service ID (that is, the service ID recommended by the associated word engine) in the D2D discovery signal monitoring list, as shown in (c) of FIG. The location and guidance message (4403) is shown.

The announcement message 4403 may include a text viewing burner 4403a and a confirmation burner 4403b. When the call original view burr 4403a is selected by the user, the terminal switches to the screen registered through the link function. At this time, the terminal refers to the link information included in the D2D monitoring list to switch to the corresponding screen. Here, the input information refers to input information input from a user who is used to generate the original view related word. For example, a text message, a memo, a voice, or an Internet page may correspond to the input information.

 On the other hand, when the confirmation burr 4403b is selected by the user, the guide message window disappears.

 In addition, the service ID may be hierarchically configured through a combination of one or more sub-service IDs. This will be described in detail with reference to the drawings below.

 47 is a diagram illustrating a branch of a hierarchical service ID according to an embodiment of the present invention.

 Referring to FIG. 47, the highest level corresponds to a commercial identifier and may be hierarchically classified into lower levels until the lowest level store ID is reached.

In the case of FIG. 47, a commercial ID is classified into a broad category of a lower level, a broad category is classified into a sub-category of a lower level, and a sub category. (Sub-Category) shows an example of being classified as a lower level Business Name, and a Business Name as a lower level store ID. Here, the sub-category is illustrated assuming one, but a sub-category may not exist, and a plurality of sub-categories may exist.

 Sub-service IDs corresponding to the corresponding levels are allocated to each level. Commercial ID and Store ID may also correspond to subservice IDs. In addition, a unique sub-service ID may be assigned to each node belonging to each Broad ^! "Broad Category, Sub-Category, and Business Name. have .

 A plurality of sub-service IDs may be mapped to each association word in the association service table configured by the terminal. This will be described with reference to the drawings below.

 48 is a diagram illustrating a mapping result of an association word and a service ID according to an embodiment of the present invention.

 As shown in FIG. 48, when the associated words are 'cold', 'body', 'drug', 'pharmacy', 'hospital', level N— 1 sub-service ID (0x2134) ('health It can be mapped to 'meaning' and level N sub-service ID (0x1123) (meaning 'pharmacy').

As such, when a plurality of sub-service IDs are mapped to the associated word, each sub-service ID is a plurality of hierarchical levels of different levels in a hierarchical service branch. Bottom service A sub-service ID may be mapped.

 In addition, when a plurality of sub-service IDs are mapped to the association word, each sub-service ID is a plurality of sub-service IDs of the same level in a hierarchical service branch. Can be mapped to

 For example, in the example of FIG. 47, when the association word is 'cafe', the sub-service ID corresponding to the 'cafe' and the restaurant and the sub-service ID corresponding to the coffee shop (sub- service D) may be mapped.

 As such, the service ID may be hierarchically composed of a combination of one or more sub-service IDs, and thus, each associated word and one or more subservice IDs (sub D) in the associated service table. -service ID) can be mapped.

 In addition, one or more sub-service IDs may be stored in response to link information in the D2D discovery signal monitoring list. That is, in the example of FIG. 46, one association link (ie, an application from which the association word is extracted) and a plurality of sub-service IDs may be mapped and stored. In addition, each store may transmit a discovery signal including a sub-service ID of a higher level to which it belongs in a hierarchical structure. This will be described with reference to the drawings below.

49 is a diagram illustrating a format of a discovery signal according to an embodiment of the present invention. Referring to FIG. 49, the D2D discovery signal includes a service ID field 4901. The service ID field 4901 includes a sub-service ID corresponding to each level in the hierarchical structure of the service ID. In FIG. 49, a level 1 sub-service ID 4911, a level 2 sub-service ID 4912, a level 3 sub-service ID 4913, and a level Example of including 4 sub-service ID 4914, level 5 sub-service ID 4915, and level 6 sub-service ID 4916 do .

 When the terminal receives the D2D discovery signal, referring to a hierarchical branch structure of the service ID, at least one of a plurality of sub service IDs mapped to specific association words in the discovery signal monitoring list configured by the terminal. If one or more sub-service IDs match, the terminal determines that it has detected a D2D discovery signal mapped to the associated word. That is, when at least one sub-service ID included in the discovery signal matches at least one or more sub-service IDs mapped to a specific association word in the discovery signal monitoring list. The terminal determines that it has detected a D2D discovery signal mapped to the associated word.

In addition, the terminal determines that a service to which the user is connected is provided in the vicinity, and this method is best suited to the user (eg, a graphical representation, a sound representation, a haptic representation). Etc.).

 In addition, when a plurality of sub-service IDs mapped to specific association words in the discovery signal monitoring list matches a discovery signal received by the terminal, the terminal preferentially matches a plurality of sub-service IDs ( It may be determined that a sub-service ID of the lowest level is mapped among the sub-service IDs. In addition, the UE informs the user that a service to which a sub-service ID of the lowest level is mapped in the neighborhood is provided.

 In this case, the terminal may inform the user that a service mapped to a sub-service ID of a next higher level is also provided nearby.

 In addition, although the terminal informs the user that a service in which a lower-level sub-service ID is mapped is provided in the vicinity, when the user receives a feedback input indicating that the information is inappropriate, the terminal secondarily receives the plurality of services. Among the sub-services, it is possible to inform that the service mapped to the sub-service ID of the next higher level is provided in the neighborhood.

 In this case, the method for notifying the user that the service mapped to the neighbor is provided to the user or the contents thereof may vary according to the level of the mapped sub-service ID.

 50 is a diagram illustrating a setting menu screen for implementing a proximity-based notification method according to an embodiment of the present invention.

50 illustrates an additional setting menu screen for controlling the associated word engine. In this case, the user can check the detailed information of the associated word engine and set detailed information. Basically, the following functions can be performed through the menu.

 -Use of corresponding function

 -View and update the associated service table

 -View and delete D2D signal monitoring list

 The user can enable or disable this function via the associated word engine on / of f button 5001. When the use of the associated word engine is off, the associated word information is not transmitted to the associated word engine, and the terminal does not provide a screen for receiving an associated word (serendipity) in each function (or application). In addition, the terminal does not compare the received D2D discovery signal with the D2D signal monitoring list.

 When the association service table 5002 is selected by the user, the association service table corresponding to the language shown in the terminal is displayed. The user can add / modify / delete related words in the related service table through the screen.

 When the D2D signal monitoring list 5003 is selected by the user, the terminal automatically displays the D2D signal monitoring list. The user can check the related link through the screen and delete the unwanted monitoring list.

The link function extracts the information to which the related words are mapped from the message, and the signal flow for the method of notifying the store / service related to the related words is shown in the drawing below. W Explain.

 51 is a diagram illustrating a proximity-based notification method according to an embodiment of the present invention.

 Referring to FIG. 51, terminal A receives information for mapping with a service ID from a user (S5101). That is, the terminal A receives the information by directly inputting information from the user or by extracting information for mapping with the service ID by the link function. For example, in the above-described example, the word “cold medicine” may be extracted from the message and input to the terminal by the link function.

 The terminal A (eg, the user D2D terminal) extracts a service ID that maps to the information input in step S5101 (S5102).

 That is, the A terminal extracts an association word mapped to information input (or extracted) in step S5101 with reference to the association service table, and extracts a service ID mapped to the association word. Then, the extracted service ID is registered in the D2D signal monitoring list. For example, in the above-described example, UE A searches for a match with the word "cold medicine" in the related words stored in the related service table or in combination with two or more words to match the related words stored in the related service table. In this case, since the word "cold" and the word "medicine" may be combined to become a "cold medicine", the service ID (0x001123) corresponding to the pharmacy is mapped (extracted).

Here, the associated word engine may exist inside the terminal but may be operated in a specific server. When operating in the server, the A terminal may transmit the information (or extracted) input in step S5101 to the server, and receive service information (or service ID) mapped with the information from the server.

 As such, if it is operated in the server, even if it does not match the related word but similar content, it can be added to the D2D signal monitoring list. For example, if the word "aspirin" is passed, this word is not related word but is a kind of "about", so the server transmits the information (or service ID) mapped to the service of "pharmacy" to terminal A, and A The terminal adds the word "aspirin" to the service ID (0X001123) corresponding to the pharmacy to the D2D signal monitoring list.

 Terminal B (eg, shop D2D terminal / device) transmits a discovery signal including a service ID periodically or aperiodically (S5103). Here, the service ID may be configured of a plurality of sub-service IDs.

 UE A monitors whether the service ID is included in the discovery signal transmitted from the surrounding D2D UE (ie, including UE B) (S5104).

 In other words, whenever a terminal A receives a discovery signal of a surrounding D2D terminal (ie, including the terminal B), the terminal A compares with the D2D signal monitoring list in real time.

As described above, since the discovery signal includes a service ID for distinguishing each other / service, the terminal extracts the service ID in the corresponding signal and continuously checks whether there is a content corresponding to the service ID in the D2D signal monitoring list. Confirm. However, this process may operate only when at least one information is stored in the D2D signal monitoring list in consideration of the performance of the terminal (or associated word engine). In addition, it can be operated only when the user enables the notification function through the setting menu of the associated word engine.

 In step S5104, direct communication between terminals (eg, LTE D2D, Bluetooth, Wi-Fi Direct, etc.) is required to provide a location-based association service (ie, notification service). For example, in a beacon device installed in a store (e.g., D2D, BLE (Bluetooth low energy), Wi-Fi Direct Services (WFDS), etc. based device), a physical signal including store information is broadcast and the surroundings are broadcast. Receive terminals within coverage. Since the transmission and reception process is required, the transmission and reception technology must be determined in advance.

 If you transmit using LTE D2D technology, you need to receive using LTE D2D technology to get exactly the information you want.

 Look at an example of using the LTE D2D discovery signal (DS: discovery signal). The DS signal may use the core functionalities of the LTE system standard protocol, that is, channel coding, modulation, multiplexing, and error correction procedure. In addition, an uplink resource (LTE) is used and a resource unit may use a resource block (RB).

The method proposed in the present invention generates LTE SC-FDMA or OFDM waveform It is assumed that the DS is transmitted to the RB or a resource allocated in multiple times of the RB using a wave generation technology.

 As described above, the DS signal is largely allocated resources by two types of resource allocation schemes.

 A resource allocation method (type 1) is to allocate a resource pool, which is a set of resource allocation units, and select a resource to be transmitted by each terminal in the resource. There are several methods for selection, including random selection, received or measured energy based selection, and variable transmission probability based selection. When the number of terminals to be transmitted is larger than the number of resource allocation units in a given resource area, two or more terminals select one resource allocation unit (discovery resource unit). In this case, the difference depends on the selection method. There may be resource stratification, though.

 Unlike the second resource allocation method (type 2), the base station directly manages and allocates resources of each terminal. That is, since the base station performs the task of allocating and retrieving individual resources to the terminal, there is virtually no probability of collision unless the intentional resource collision is intended. In the type 2 resource allocation method, there is a method of allocating a specific resource periodically or continuously for a specific time (type 2B), while there is a method of allocating a resource once in a request for a required resource (type 2A). .

The resource allocation method for the discovery signal is summarized as follows. Resource Allocation (RA) Type 1: discovery procedure where resources for discovery signal transmission are allocated on a non UE specif ic basis

 RA type 2: type 2: discovery procedure where resources for discovery signal transmission are allocated on a per UE specif ic basis

 RA type 2A: Resources are allocated for each specif ic transmission instance of discovery signals

 RA type 2B: resources are semi -persistently allocated for discovery signal transmission

 In step S5103, the B terminal transmits a discovery signal through discovery resources allocated according to any one of the above-described discovery resource allocation types.

 When the service ID included in the D2D signal monitoring list and the service ID included in the received discovery signal coincide with each other, the terminal A displays this on the screen and notifies the user (S5105).

That is, when the terminal A receives the discovery signal including the service ID mapped to the information input in step S5101, the terminal A displays store information corresponding to the service ID. again In other words, the terminal A is notified to the screen through the associated word engine when a shop that matches the associated shopping mall is detected. The user can check this information and read the original text.

 When the original view is selected by the user, the terminal A displays the notification details on the screen (S5106).

 Specifically, when the original view is selected by the user, the terminal A moves (switches) to a function (or a grand program or an application) to which information has been input (or extracted) in step S5101 and displayed on the screen. For example, in the above-described example, when terminal A parses an associated link in the D2D signal monitoring list, Message ID: 5 is output and moves to the fifth item of the message function.

 Step S5106 may be omitted since it may be performed when necessary. In addition, when the screen shown in the terminal in step S5105 and S5106 is terminated, the terminal deletes the corresponding service ID from the D2D signal monitoring list. Meanwhile, the following method may be used to solve the case where the service ID is duplicated in a situation where a plurality of beacon transmitting apparatus coexists.

Hereinafter, for convenience of description, a terminal that periodically broadcasts a beacon signal (for example, a BLE iBeacon or D2D discovery signal) is referred to as a beacon terminal. As an example of the beacon terminal, the user terminal may correspond to this, but a device fixedly installed in a store may correspond to this. 1) Method of selecting in the receiving terminal (BLE beacon terminal vs. D2D beacon terminal)) BLE-based beacon signal (hereinafter 'iBeacon') and LTE D2D discovery signal may coexist at the same time point at the same place. The operation is suggested as follows. It is assumed that both support the same service based on the associated word engine. In this case, various operation methods are possible based on technology or grand program.

 52 is a diagram illustrating a method for preventing duplication of a service ID according to an embodiment of the present invention.

 Referring to FIG. 52, a first beacon terminal (eg, a BLE beacon terminal) and a second beacon terminal (eg, a D2D discovery (beacon) signal transmission terminal) may each use a first beacon signal (eg, iBeacon) and the second beacon signal (eg, discovery signal) are broadcasted (S5201).

 The terminal selectively receives the beacon signal among the first beacon signal and the second beacon signal (S5202).

Specifically, the terminal may operate to block any one beacon signal in software or hardware so that the reception function of the first beacon signal and the second beacon signal are not simultaneously turned on. For example, when the iBeacon reception function is turned on, the D2D discovery signal reception function is turned off or vice versa (alternatively). That is, the terminal may deactivate the function of any one communication model. If the above two associations If there is a priority between the engines, only the function of receiving a higher priority signal is activated. For example, if a higher priority is set for the D2D discovery signal receiving function, the BLE iBeacon receiving function may be turned off. In other words, when two beacon signals (iBeacon and discovery signals) are received (that is, in an environment in which two beacon signals are received), the reception function of any one beacon signal is turned off. By extending this concept, even when a plurality of user programs use the first beacon signal or the second beacon signal, only one of the beacon signal receiving functions may be set to ON.

 In addition, when a priority is set for a specific application, the communication modules connected with the first priority program are turned on, and the functions of the other communication modules are turned off. Can be. Alternatively, it can be implemented.

 In addition, the reception function of both the first beacon signal and the second beacon signal is set to be turned on at the same time, but may also be notified on the screen by blocking it in the application program. That is, when the beacon signal is received at the physical layer and transmitted to the upper layer, the beacon signal transmitted from the lower layer can be selectively blocked from the uppermost layer (for example, the male layer) operating the application program. To do this, it is necessary to prioritize any beacon signals in the application. This priority may be changed by the user.

In addition, both reception functions of the first beacon signal and the second beacon signal can be turned on simultaneously. In addition, by receiving two function-based signals at the same time can provide a separate service. That is, new information may be delivered by combining an ID (eg, iBeacon ID) received through the first beacon signal and an ID (eg, D2D Work D) received through the second beacon signal. In addition, this may be implemented through a separate device. However, a terminal that does not recognize a combination of two IDs may receive a service based on each ID ' . As such, by selectively receiving the beacon signal at the receiving end of the beacon signal, it is possible to prevent the service ID from being duplicated.

 2) A method for stopping transmission through mutual signal detection between transmission beacon devices (BLE beacon terminal to D2D beacon terminal)

 In a situation where the BLE iBeacon and the D2D discovery signal (beacon) are sent in the same order, the BLE beacon device may be turned off if the D2D beacon device (terminal) has a signal reception function.

 53 is a diagram illustrating a method for preventing duplication of a service ID according to an embodiment of the present invention.

 Referring to FIG. 53, a first beacon terminal (eg, a BLE beacon terminal) and a second beacon terminal (eg, a D2D discovery (beacon) signal transmission terminal) may each use a first beacon signal (eg, iBeacon) and a second beacon signal (eg, a discovery signal) are broadcasted (S5301).

The first beacon terminal transmits a beacon interrupt request message for requesting to stop transmission of the beacon signal to the second beacon terminal (S5302). Received a beacon stop request message The second beacon terminal stops transmitting the beacon signal (S5303).

 For example, when a D2D beacon device / terminal receives an iBeacon, it may attempt to connect to the BLE beacon device / terminal to stop transmitting the beacon of the BLE device / terminal. Alternatively, the reverse operation is possible. It may be selected to operate depending on which device sets the higher priority for the beacon signal.

 3) How to turn off the transmission of other devices by contacting and connecting external devices (between D2D beacon devices or terminals)

 A docking device (eg, a docking station or a docking accessory) may exist for the floor of the terminal and the interface with another device. In this case, when connecting to the docking device or when the terminal power is connected, the beacon signal transmission of the other beacon terminal may be detected by turning off the beacon signal. In other words, the docking device may be used to automatically set on / off (f) between D2D devices (or between BLE devices). Hereinafter, a description will be given assuming a D2D device for convenience of description.

 The docking device basically has a separate unique ID linked to one D2D ID, and when the D2D terminal is mounted on the docking device, the docking device automatically transmits the corresponding D2D ID. This operation assumes that even when the D2D user equipment is docking with another D2D ID, it is automatically changed to the D2D ID linked with the docking device.

54 is a diagram illustrating a method for preventing duplication of a service ID according to an embodiment of the present invention. When the terminal is connected to the docking device (S5401), it broadcasts a discovery signal for requesting to stop using the same D2D ID (S5402).

Here, the discovery signal for requesting the same D2D ID interruption may correspond to a specific discovery signal (or beacon signal) at the moment of being connected to the docking station, and also transmits a specific D2D ID to use the same D2D ID of the surroundings. The operation of the beacon device can be turned off. In this case, the specific discovery signal may not be continuously transmitted but may be temporarily sent only for a certain time at the moment of connection. '

 Thereafter, the terminal broadcasts a discovery signal (or beacon signal) including a normal D2D ID (S5403).

 In addition, a discovery signal (including a specific discovery signal or a special D2D ID) for requesting the use of the same D2D ID interruption may be transmitted only during a limited time in the process of transmitting a normal D2D ID.

 In addition, information for requesting use of the same D2D ID interruption may be included in a normal discovery signal and transmitted. That is, step S5402 may be omitted, and information for requesting the use of the D2D ID suspension may be included in the discovery signal transmitted in S5403 and transmitted.

In more detail, the signal transmitted from the D2D device mounted in the docking station includes a D2D on / off field that can turn off the device that transmits the same D2D ID of the surroundings. You can indicate a specific value in that field. week If there is a D2D device that transmits the same D2D ID (i.e., transmits a discovery signal) to the side and receives the same D2D ID and the D2D On / Off field is set (ie, indicates off value), the corresponding D2D ID is received. The D2D device will automatically turn off. The D2D on / off field may not be arbitrarily input by a general user or a server and may be limited to a special case such as a docked case. General wireless communication device to which the present invention can be applied

 55 is a block diagram illustrating a wireless communication device according to one embodiment of the present invention.

 Referring to FIG. 55, a wireless communication system includes a base station / network node 5510 and a plurality of terminals 5520 (or D2D / BLE beacon terminal / device). Here, as an example of a network node, an MME or an M2M server may correspond.

 The base station / network node 5510 includes a processor 5511, a memory 5512, and a communication unit 5513.

The processor 5511 implements the functions, processes, and / or methods proposed in FIGS. 1 to 54. Layers of the wired / wireless interface protocol may be implemented by the processor 5511. The memory 5512 is connected to the processor 5511 and stores various information for driving the processor 5511. The communication unit 5513 is connected to the processor 5511 and transmits and / or receives a wired / wireless signal. In particular, when the base station / network node (5510) is a base station, the communication unit (5513) to transmit / receive a radio signal One RF unit may include a radio frequency unit.

 The terminal 5520 may include a processor 5551, a memory 5522, and a communication unit (or radio frequency unit) 5523. The processor 5551 may include the functions and processes previously proposed in FIGS. 1 to 54. And / or implement the methods Layers of the air interface protocol may be implemented by the processor 5551. Memory 5522 is coupled with the processor 5251 to provide various means for driving the processor 5251. The communication unit 5523 is connected to the processor 5551 to transmit and / or receive a radio signal The memories 5512 and 5522 may be internal or external to the processors 5511 and 5521 and may be well connected. Various known means may be connected to the processors 5511 and 5521. In addition, when the base station / network node 5510 is a base station and / or the terminal 5520 may be a single antenna or multiple antennas. ) * 7]. A block diagram of another terminal according to an embodiment of the present invention is a block diagram.

 Referring to FIG. 56, the terminal 5600 includes a wireless communication unit 5610, an input unit 5620, a sensing unit 5640, an output unit 5650, a memory 5660, an interface unit 5670, a controller 5580, and the like. A power supply 5590, and the like. The components shown in FIG. 56 are not essential, so a mobile terminal having more or fewer components may be implemented.

 Hereinafter, the components will be described in order.

The wireless communication unit 5610 may be between the terminal 5600 and the wireless communication system or the terminal. It may include one or more modalities that enable wireless communication between the 5600 and the network in which the terminal 5600 is located. For example, the wireless communication unit 5610 may include a broadcast receiving module 5611, a mobile communication module 5612, a wireless Internet module 5613, a short range communication module 5614, a location information module 5615, and the like. .

 The broadcast reception modules 5611 receive a broadcast signal and / or broadcast related information from an external broadcast management server through a broadcast channel.

 The broadcast channel may include a satellite channel and a terrestrial channel. The broadcast management server may mean a server for generating and transmitting broadcast signals and / or broadcast related information or a server receiving pre-generated broadcast signals and / or broadcast related information and transmitting the same to a terminal. The broadcast signal may include not only a TV broadcast signal, a radio broadcast signal, and a data broadcast signal, but also a broadcast signal having a data broadcast signal combined with a TV broadcast signal or a radio broadcast signal.

 The broadcast associated information may mean information related to a broadcast channel, a broadcast program, or a broadcast service provider. The broadcast related information may also be provided through a mobile communication network. In this case, it may be received by the mobile communication modules 5612.

The broadcast related information may exist in various forms. For example, it may exist in the form of Electronic Program Guide (EPG) of Digital Multimedia Broadcasting (DMB) or Electronic Service Guide (ESG) of Digital Video Broadcast-Handheld (DVB). The broadcast reception modules 5611 may include, for example, digital multimedia broadcasting (terrestrial) or digital multimedia broadcasting (DMB-S).

Digital broadcast signals such as Broadcasting-Satellite, MediaFLO (Media Forward Link Only), Digital Video Broadcast-Handheld (DVB-H), and Integrated Services Digital Broadcast-Terrestrial (ISDB-T) can be used to receive digital broadcast signals. Can be. Of course, the broadcast reception modules 5611 may be configured to suit not only the above-described digital broadcast system but also other broadcast systems. The broadcast signal and / or broadcast related information received through the broadcast reception modules 5611 may be stored in the memory 5660.

 The mobile communication modules 5612 transmit and receive wireless signals with at least one of a base station, an external terminal, and a server on a mobile communication network. The wireless signal may include various types of data according to transmission and reception of a voice call signal, a video call signal, or a text / multimedia message.

 The wireless Internet modules 5613 are models for wireless Internet access, and may be embedded or external to the terminal 5600. Wireless Internet technologies include LAN (Wireless LAN) (Wi-Fi), Wibro (Wireless broadband),

Wimax (World Interoperability for Microwave Access), HSDPA (High Speed Downlink Packet Access) and the like can be used.

The near field communication module 5614 refers to models for near field communication. Short Range Communication (Bluetooth), Radio Frequency Identification (RFID), Infrared Communication (IrDA) Association (UWB), Ultra Wideband (UWB), ZigBee and the like can be used.

 The location information module 5615 is a module for obtaining a location of a mobile terminal, and a representative example thereof is a GPS (Global Position System) model.

 The input unit 5620 is for an audio signal or a video signal input or a user input. The camera 5221 and the microphone 5222 may be included to input an audio signal or a video signal.

 The camera 5221 processes image frames such as still images or moving images obtained by the image sensor in a video call mode or a photographing mode. The processed image frame can be displayed on the display portion 5565.

 The image frame processed by the camera 5561 may be stored in the memory 5660 or transmitted to the outside through the wireless communication unit 5610. Two or more cameras 5562 may be provided according to a usage environment.

 The microphone 5562 receives an external sound signal by a microphone in a call mode, a recording mode, a voice recognition mode, etc., and processes the external sound signal into electrical voice data. The processed voice data may be converted into a form transmittable to the mobile communication base station through the mobile communication mode 5612 in the call mode and output. The microphone 5222 may be implemented with various noise removing algorithms for removing noise generated in the process of receiving an external sound signal.

The user input unit 5253 generates input data for the user to control the operation of the terminal. The user input unit 130 may use a key pad dome switch. switch), touch pad (static pressure / capacitance), jog wheel, jog switch, and the like. The sensing unit 5640 detects a current state of the terminal 5600 such as an open / closed state of the terminal 5600, a position of the terminal 5600, presence or absence of a user contact, orientation of the terminal, acceleration / deceleration of the terminal, and the like. Generates a sensing signal for controlling the operation of). For example, when the terminal 5600 is in the form of a slide phone, it may sense whether the slide H phone is opened or closed. In addition, whether the power supply unit 5590 is supplied with power, whether the interface unit 5670 is connected to the external device may be sensed. On the other hand, the sensing unit 5640 is a proximity sensor, a sensor that can detect the heart rate, pulse, breathing, blood pressure, etc. of the user of the terminal 5600, a sensor that can sense the temperature, noise, etc. around the terminal 5600 It may include.

 The output unit 5650 is configured to generate an output related to visual, auditory, or tactile senses, and may include a display unit 5651, an acoustic output module 5652, an alarm unit 553, and a haptic module 5546. have.

 The display unit 5565 displays (outputs) information processed by the terminal 5600. For example, when the mobile terminal is in the call mode, the UI (User Interface) or GUI (Graphic User Interface) # associated with the call is displayed. When the terminal 5600 is in the video call mode or the shooting mode, the terminal 5600 displays the taken or / and the received image, UI, GUI.

The display unit 5651 may include a liquid crystal display (LCD), a thin film transistor-liquid crystal display (TFT LCD), and an organic light-emitting diode (OLED). diode, a flexible display, or a 3D display.

 Some of these displays may be configured to be transparent or light transmissive so that they can be seen through them. This may be referred to as a transparent display. A representative example of the transparent display is TOLED (Transparant OLED). The rear structure of the display portion 5565 may also be configured as a light transmissive structure. By this structure, the user can see the object located behind the terminal body through the area occupied by the display unit 5551 of the terminal body.

 According to an implementation of the terminal 5600, two or more display units 5651 may exist. For example, a plurality of display units may be spaced apart or integrally disposed on one surface of the terminal 5600, or may be disposed on different surfaces.

 When the display unit 5651 and the sensor for detecting a touch operation (hereinafter, referred to as a touch sensor) form a mutual layer structure (hereinafter, referred to as a touch screen), the display unit 5565 may be input in addition to the output device. It can also be used as a device. The touch sensor may have, for example, a form of a touch film, a touch sheet, a touch pad, or the like.

 The touch sensor may be configured to convert a change in pressure applied to a specific portion of the display portion 5651 or capacitance generated at a specific portion of the display portion 5565 to an electrical input signal. The touch sensor may be configured to detect not only the position and area of the touch but also the pressure at the touch.

If there is a touch input to the touch sensor, the corresponding signal (s) is touch Sent to the controller. The touch controller processes the signal (s) and then transmits the corresponding data to the controller 5680. As a result, the controller 5680 may know which area of the display 5651 is touched.

 The proximity sensor may be disposed in an inner region of the mobile terminal wrapped by the touch screen or near the touch screen. The proximity sensor refers to a sensor that detects the presence or absence of an object approaching a predetermined detection surface or an object present near the detection surface without using mechanical force or infrared rays. Proximity sensors have a longer life and higher utilization than touch sensors.

 Examples of the proximity sensor include a transmission photoelectric sensor, a direct reflection photoelectric sensor, a mirror reflection photoelectric sensor, a high frequency oscillation proximity sensor, a capacitive proximity sensor, a magnetic proximity sensor, and an infrared proximity sensor. When the touch screen is capacitive, the touch screen is configured to detect proximity of the pointer due to a change in electric field according to the proximity of the pointer. In this case, the touch screen (touch sensor) may be classified as a proximity sensor.

The embodiments described above are the components and features of the present invention are combined in a predetermined form. Each component or feature is to be considered optional unless stated otherwise. Each component or feature may be embodied in a form that is not combined with any other component or feature. It is also possible to combine some components and / or features to constitute an embodiment of the invention. The order of the operations described in the embodiments of the present invention may be changed. Some components or features of one embodiment may be included in another embodiment, or may be replaced with other components or features of another embodiment. Can be. It is obvious that the embodiments can be constructed by combining claims that are not expressly cited in the claims or incorporated into new claims by post-application correction.

 Embodiments according to the present invention may be implemented by various means, for example, hardware, firmware, software, or a combination thereof. In the case of a hardware implementation, an embodiment of the invention may include one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs). It can be implemented by FPGAs (programmable gate arrays), processors, controllers, microcontrollers, microprocessors, and the like.

 In the case of implementation by firmware or software, an embodiment of the present invention may be implemented in the form of modules, procedures, functions, etc. that perform the functions or operations described above. The software code may be stored in memory and driven by the processor. The memory may be located inside or outside the processor, and may exchange data with the processor by various known means.

It is apparent to those skilled in the art that the present invention can be embodied in other specific forms without departing from the essential features of the present invention. Accordingly, the above detailed description should not be construed as limiting in all respects but should be considered as illustrative. The scope of the invention should be determined by reasonable interpretation of the appended claims, and all changes within the equivalent scope of the invention are included in the scope of the invention. Industrial Applicability

 The proximity-based notification scheme in the wireless communication system of the present invention has been described with reference to an example applied to the 3GPP LTE / LTE-A system. However, the proximity-based notification scheme may be applied to various wireless communication systems in addition to the 3GPP LTE / LTE-A system.

Claims

[Range of request]
 [Claim 1]
 In a proximity-based notification method in a wireless communication system supporting device to device communication (D2D),
 Setting a terminal list and a notification time for the first terminal to participate in the notification service;
 When the notification time is reached, broadcasting, by the first terminal, a first discovery signal including a first D2D ID through a physical side link discovery channel (PSCH); And
When the first terminal receives a second discovery signal including a second D2D ID from the second terminal belonging to the terminal list through the PSDCH, the first terminal outputs a notification for notifying that the two terminals are in proximity. Proximity-based notification method that includes steps. '[Claim 2]
 The method of claim 1,
 And transmitting, by the first terminal, a notification service use consent request message for requesting to join the notification service to the second terminal.
 [Claim 3]
The method of claim 2, And receiving, by the first terminal, the first D2D ID and the second D2D ID from a D2D ID management server.
 【Claim 4】.
 The method of claim 2,
 Receiving, by the first terminal, the first D2D ID from a D2D ID management server; And
 And receiving, by the first terminal, the second D2D ID from the second terminal.
 [Claim 5]
 The method of claim 4, wherein
 Proximity-based notification method further comprises the step of the first terminal returns the first D2D ID to the D2D ID management server.
 [Claim 6]
 In a proximity-based notification method in a wireless communication system supporting device to device communication (D2D),
 Receiving, by the terminal, input information from a user;
Mapping, by the terminal, the input information and a service ID; Monitoring, by the terminal, whether the mapped service ID is included in a discovery signal transmitted from a neighboring terminal through a physical sidelink discovery channel (PSCH); And And when the terminal receives a discovery signal including the mapped service ID, outputting a notification for notifying that the service matched with the mapped service ID is close.
 [Claim 7]
 The method of claim 6,
 And generating, by the terminal, a discovery signal monitoring list including link information for connecting the mapped service ID and the application to which the input information is input.
 [Claim 8]
 The method of claim 7, wherein
 And displaying, by the terminal, the application program in which the input information is input using the link information.
 [Claim 9]
 The method according to claim 6,
 The service ID is hierarchical through a combination of one or more sub-service IDs.
 [Claim 10]
A first terminal for performing proximity-based notification in a wireless communication system supporting device to device communication (D2D), comprising: a radio frequency (RF) unit for transmitting and receiving a radio signal; And Includes a processor,
 The processor sets a terminal list and notification time to participate in the notification service,
 When the predetermined notification time is reached, broadcasting a first discovery signal including a first D2D ID through a physical sidelink discovery channel (PSCH),
 And receiving a second discovery signal including a second D2D ID from the second terminal belonging to the terminal list through the PSDCH, and outputting a notification for notifying that the second terminal is in proximity.
 [Claim 11]
 A terminal for performing proximity based notification in a wireless communication system supporting device to device communication (D2D), comprising: an input unit for inputting information;
 RF (Radio Frequency) unit for transmitting and receiving radio signals; And
 Includes a processor,
 The processor receives input information from a user,
 Mapping the input information to a service ID,
Monitoring whether the mapped service ID is included in a discovery signal transmitted from a neighboring terminal through a physical sidelink discovery channel (PSCH), When receiving a discovery signal including the mapped service ID, the terminal is configured to output a notification for notifying that the service corresponding to the mapped service ID is close.
PCT/KR2015/003674 2014-04-13 2015-04-13 Method for proximity-based notification in wireless communication system, and device for same WO2015160157A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
US201461978978P true 2014-04-13 2014-04-13
US201461978977P true 2014-04-13 2014-04-13
US201461978979P true 2014-04-13 2014-04-13
US201461978976P true 2014-04-13 2014-04-13
US61/978,977 2014-04-13
US61/978,979 2014-04-13
US61/978,976 2014-04-13
US61/978,978 2014-04-13

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR1020167029262A KR101789497B1 (en) 2014-04-13 2015-04-13 Method for proximity-based notification in wireless communication system, and device for same
US15/303,918 US10237717B2 (en) 2014-04-13 2015-04-13 Method for proximity-based notification in wireless communication system, and device for same
EP15780134.1A EP3133843B1 (en) 2014-04-13 2015-04-13 Proximity-based notification in a wireless communication system

Publications (1)

Publication Number Publication Date
WO2015160157A1 true WO2015160157A1 (en) 2015-10-22

Family

ID=54324290

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2015/003674 WO2015160157A1 (en) 2014-04-13 2015-04-13 Method for proximity-based notification in wireless communication system, and device for same

Country Status (4)

Country Link
US (1) US10237717B2 (en)
EP (1) EP3133843B1 (en)
KR (1) KR101789497B1 (en)
WO (1) WO2015160157A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017123385A1 (en) * 2016-01-15 2017-07-20 Intel IP Corporation Proximity information in configuration of data links in wireless networks

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105101041A (en) * 2014-05-07 2015-11-25 夏普株式会社 Base station, user equipment, and related method
WO2016021929A1 (en) * 2014-08-05 2016-02-11 엘지전자(주) Method for performing transmission power control in wireless communication system and device therefor
US9980281B2 (en) * 2014-08-06 2018-05-22 Lg Electronics Inc. Method for performing transmission power control in wireless communication system and device therefor
US20160142991A1 (en) * 2014-11-13 2016-05-19 Futurewei Technologies, Inc. System and Method for Signaling a Prohibited D2D Operation
CN106211027A (en) * 2014-12-25 2016-12-07 北京三星通信技术研究有限公司 A kind of method and apparatus realizing D2D terminal Time and Frequency Synchronization
US9930144B2 (en) * 2015-01-30 2018-03-27 Panasonic Intellectual Property Management Co., Ltd. Information processing method
CN104811903A (en) * 2015-03-25 2015-07-29 惠州Tcl移动通信有限公司 Method for establishing communication group and wearable device capable of establishing communication group
EP3332576A4 (en) * 2015-08-07 2019-03-13 ZTE Corporation System and method to measure ue-to-ue distance based on d2d sidelink channel
US20180235018A1 (en) * 2015-08-11 2018-08-16 David Comstock User equipment(ue) device-associated identifiers
US20170048904A1 (en) * 2015-08-11 2017-02-16 Beartooth Radio, Inc. Wireless Data Transmission System
US9935946B2 (en) * 2015-12-16 2018-04-03 Hand Held Products, Inc. Method and system for tracking an electronic device at an electronic device docking station
CN107371233A (en) * 2016-05-12 2017-11-21 财团法人工业技术研究院 Synchronizing signal receiving/transmission method and radio communication device
US10281589B2 (en) * 2016-08-29 2019-05-07 International Business Machines Corporation Dynamic GPS location update
US9860677B1 (en) * 2016-09-30 2018-01-02 Intel Corporation Internet-of-things gateway coordination
CN106908780B (en) * 2017-03-16 2019-09-13 北京理工大学 Radio proximity detecting method and detection Intelligentized method based on OFDM
WO2018202204A1 (en) * 2017-05-05 2018-11-08 华为技术有限公司 Reflective service flow characteristic-based communication method and device
GB2573010A (en) * 2018-04-20 2019-10-23 Motor Record Ltd Peer to peer communication system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110294474A1 (en) * 2010-06-01 2011-12-01 Qualcomm Incorporated Multi-Homed Peer-to-Peer Network
US20120163235A1 (en) * 2008-11-24 2012-06-28 Qualcomm Incorporated Configuration of user equipment for peer-to-peer communication
KR20130129373A (en) * 2010-10-20 2013-11-28 마벨 월드 트레이드 리미티드 Pre-association discovery
US20130324114A1 (en) * 2012-05-31 2013-12-05 Interdigital Patent Holdings, Inc. Method and apparatus for device-to-device (d2d) mobility in wireless systems
US20140056220A1 (en) * 2012-08-23 2014-02-27 Interdigital Patent Holdings, Inc. Method and apparatus for performing device-to-device discovery

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130051277A1 (en) * 2011-08-30 2013-02-28 Renesas Mobile Corporation Method and apparatus for allocating resources for device-to-device discovery
US8688839B2 (en) * 2011-12-02 2014-04-01 Verizon Patent And Licensing Inc. Intelligent connection manager
EP3512293A3 (en) * 2012-04-27 2019-10-02 Interdigital Patent Holdings, Inc. Apparatus and method for resource allocation for device-to-device (d2d) communication
US9160497B2 (en) * 2012-07-02 2015-10-13 Intel Corporation Application continuity with reroute and reset in a wireless communication network
CN107432024A (en) * 2015-03-31 2017-12-01 株式会社Ntt都科摩 User's set and base station

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120163235A1 (en) * 2008-11-24 2012-06-28 Qualcomm Incorporated Configuration of user equipment for peer-to-peer communication
US20110294474A1 (en) * 2010-06-01 2011-12-01 Qualcomm Incorporated Multi-Homed Peer-to-Peer Network
KR20130129373A (en) * 2010-10-20 2013-11-28 마벨 월드 트레이드 리미티드 Pre-association discovery
US20130324114A1 (en) * 2012-05-31 2013-12-05 Interdigital Patent Holdings, Inc. Method and apparatus for device-to-device (d2d) mobility in wireless systems
US20140056220A1 (en) * 2012-08-23 2014-02-27 Interdigital Patent Holdings, Inc. Method and apparatus for performing device-to-device discovery

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3133843A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017123385A1 (en) * 2016-01-15 2017-07-20 Intel IP Corporation Proximity information in configuration of data links in wireless networks
US10194370B2 (en) 2016-01-15 2019-01-29 Intel IP Corporation Proximity information in configuration of data links in wireless networks

Also Published As

Publication number Publication date
US10237717B2 (en) 2019-03-19
EP3133843A1 (en) 2017-02-22
KR101789497B1 (en) 2017-10-25
EP3133843B1 (en) 2018-12-12
EP3133843A4 (en) 2017-12-20
KR20160143692A (en) 2016-12-14
US20170034688A1 (en) 2017-02-02

Similar Documents

Publication Publication Date Title
DK2258124T3 (en) Method and apparatus for delivering public warning messages
RU2571825C2 (en) Method and system for providing enhanced location information for wireless mobile devices
AU2012304619B2 (en) Methods and apparatus for accessing localized applications
Lei et al. Operator controlled device-to-device communications in LTE-advanced networks
EP2892299B1 (en) Method, apparatus and system for d2d communication
CN102576068B (en) Method and apparatus for supporting positioning measurements
US10178701B2 (en) System and methods for controlling out-of-network D2D communications
CN104812025B (en) Method and system for discovering and communicating between devices
JP2017510191A (en) Method and apparatus for synchronization in a device-to-device communication network
JP6197109B2 (en) Method and apparatus for using resources for D2D operation in a wireless communication system
CN104350779B (en) Manage uncertain measurement opportunity
US20130122893A1 (en) Discovery In Device-To-Device Communication
KR20150002521A (en) Method and apparatus for device to device communication
US9698996B2 (en) Information acquisition using a scalable wireless geocast protocol
JP2015525540A (en) Multipurpose broadband network method and system
JP2016028540A (en) Terminal device, base station device, method executed by terminal device, and method executed by base station device
KR101875851B1 (en) System and method for device-to-device synchronization
CN108347713A (en) WTRU and the method executed by WTRU
TW201218829A (en) System and method for dynamic coordination of radio resources usage in a wireless network environment
CN110062371A (en) The method and apparatus found for executive device to device
CN105684529A (en) Device-to-device communication synchronization
CN105191453B (en) Method and apparatus for Network Synchronization
CN107040868A (en) Use the point-to-point operation outside the LTE air interface synchronization network coverages with the local network coverage
WO2013103848A1 (en) System and method for device discovery for device-to-device communication in a cellular network
JP6156758B2 (en) Method of issuing content and user equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15780134

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 15303918

Country of ref document: US

ENP Entry into the national phase in:

Ref document number: 20167029262

Country of ref document: KR

Kind code of ref document: A

REEP Request for entry into the european phase

Ref document number: 2015780134

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015780134

Country of ref document: EP